DQN approach for adaptive self-healing of VNFs in cloud-native network
- Arulappan, Arunkumar, Mahanti, Aniket, Passi, Kalpdrum, Srinivasan, Thiruvenkadam, Naha, Ranesh, Raja, Gunasekaran
- Authors: Arulappan, Arunkumar , Mahanti, Aniket , Passi, Kalpdrum , Srinivasan, Thiruvenkadam , Naha, Ranesh , Raja, Gunasekaran
- Date: 2024
- Type: Text , Journal article
- Relation: IEEE Access Vol. 12, no. (2024), p. 34489-34504
- Full Text:
- Reviewed:
- Description: The transformation from physical network function to Virtual Network Function (VNF) requires a fundamental design change in how applications and services are tested and assured in a hybrid virtual network. Once the VNFs are onboarded in a cloud network infrastructure, operators need to test VNFs in real-time at the time of instantiation automatically. This paper explicitly analyses the problem of adaptive self-healing of a Virtual Machine (VM) allocated by the VNF with the Deep Reinforcement Learning (DRL) approach. The DRL-based big data collection and analytics engine performs aggregation to probe and analyze data for troubleshooting and performance management. This engine helps to determine corrective actions (self-healing), such as scaling or migrating VNFs. Hence, we proposed a Deep Queue Learning (DQL) based Deep Queue Networks (DQN) mechanism for self-healing VNFs in the virtualized infrastructure manager. Virtual network probes of closed-loop orchestration perform the automation of the VNF and provide analytics for real-time, policy-driven orchestration in an open networking automation platform through the stochastic gradient descent method for VNF service assurance and network reliability. The proposed DQN/DDQN mechanism optimizes the price and lowers the cost by 18% for resource usage without disrupting the Quality of Service (QoS) provided by the VNF. The outcome of adaptive self-healing of the VNFs enhances the computational performance by 27% compared to other state-of-the-art algorithms. © 2013 IEEE.
- Authors: Arulappan, Arunkumar , Mahanti, Aniket , Passi, Kalpdrum , Srinivasan, Thiruvenkadam , Naha, Ranesh , Raja, Gunasekaran
- Date: 2024
- Type: Text , Journal article
- Relation: IEEE Access Vol. 12, no. (2024), p. 34489-34504
- Full Text:
- Reviewed:
- Description: The transformation from physical network function to Virtual Network Function (VNF) requires a fundamental design change in how applications and services are tested and assured in a hybrid virtual network. Once the VNFs are onboarded in a cloud network infrastructure, operators need to test VNFs in real-time at the time of instantiation automatically. This paper explicitly analyses the problem of adaptive self-healing of a Virtual Machine (VM) allocated by the VNF with the Deep Reinforcement Learning (DRL) approach. The DRL-based big data collection and analytics engine performs aggregation to probe and analyze data for troubleshooting and performance management. This engine helps to determine corrective actions (self-healing), such as scaling or migrating VNFs. Hence, we proposed a Deep Queue Learning (DQL) based Deep Queue Networks (DQN) mechanism for self-healing VNFs in the virtualized infrastructure manager. Virtual network probes of closed-loop orchestration perform the automation of the VNF and provide analytics for real-time, policy-driven orchestration in an open networking automation platform through the stochastic gradient descent method for VNF service assurance and network reliability. The proposed DQN/DDQN mechanism optimizes the price and lowers the cost by 18% for resource usage without disrupting the Quality of Service (QoS) provided by the VNF. The outcome of adaptive self-healing of the VNFs enhances the computational performance by 27% compared to other state-of-the-art algorithms. © 2013 IEEE.
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
- Khan, Zahoor, Amjad, Sana, Ahmed, Farwa, Almasoud, Abdullah, Imran, Muhammad, Javaid, Nadeem
- Authors: Khan, Zahoor , Amjad, Sana , Ahmed, Farwa , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 31036-31051
- Full Text:
- Reviewed:
- Description: Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE.
A blockchain-based deep-learning-driven architecture for quality routing in wireless sensor networks
- Authors: Khan, Zahoor , Amjad, Sana , Ahmed, Farwa , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 31036-31051
- Full Text:
- Reviewed:
- Description: Over the past few years, great importance has been given to wireless sensor networks (WSNs) as they play a significant role in facilitating the world with daily life services like healthcare, military, social products, etc. However, heterogeneous nature of WSNs makes them prone to various attacks, which results in low throughput, and high network delay and high energy consumption. In the WSNs, routing is performed using different routing protocols like low-energy adaptive clustering hierarchy (LEACH), heterogeneous gateway-based energy-aware multi-hop routing (HMGEAR), etc. In such protocols, some nodes in the network may perform malicious activities. Therefore, four deep learning (DL) techniques and a real-time message content validation (RMCV) scheme based on blockchain are used in the proposed network for the detection of malicious nodes (MNs). Moreover, to analyse the routing data in the WSN, DL models are trained on a state-of-the-art dataset generated from LEACH, known as WSN-DS 2016. The WSN contains three types of nodes: sensor nodes, cluster heads (CHs) and the base station (BS). The CHs after aggregating the data received from the sensor nodes, send it towards the BS. Furthermore, to overcome the single point of failure issue, a decentralized blockchain is deployed on CHs and BS. Additionally, MNs are removed from the network using RMCV and DL techniques. Moreover, legitimate nodes (LNs) are registered in the blockchain network using proof-of-authority consensus protocol. The protocol outperforms proof-of-work in terms of computational cost. Later, routing is performed between the LNs using different routing protocols and the results are compared with original LEACH and HMGEAR protocols. The results show that the accuracy of GRU is 97%, LSTM is 96%, CNN is 92% and ANN is 90%. Throughput, delay and the death of the first node are computed for LEACH, LEACH with DL, LEACH with RMCV, HMGEAR, HMGEAR with DL and HMGEAR with RMCV. Moreover, Oyente is used to perform the formal security analysis of the designed smart contract. The analysis shows that blockchain network is resilient against vulnerabilities. © 2013 IEEE.
A literature review of the positive displacement compressor : current challenges and future opportunities
- Lu, Kui, Sultan, Ibrahim, Phung, Truong
- Authors: Lu, Kui , Sultan, Ibrahim , Phung, Truong
- Date: 2023
- Type: Text , Journal article , Review
- Relation: Energies Vol. 16, no. 20 (2023), p.
- Full Text:
- Reviewed:
- Description: Positive displacement compressors are essential in many engineering systems, from domestic to industrial applications. Many studies have been devoted to providing more insights into the workings and proposing solutions for performance improvements of these machines. This study aims to present a systematic review of published research on positive displacement compressors of various geometrical structures. This paper discusses the literature on compressor topics, including leakage, heat transfer, friction and lubrication, valve dynamics, port characteristics, and capacity control strategies. Moreover, the current status of the application of machine learning methods in positive displacement compressors is also discussed. The challenges and opportunities for future work are presented at the end of the paper. © 2023 by the authors.
- Authors: Lu, Kui , Sultan, Ibrahim , Phung, Truong
- Date: 2023
- Type: Text , Journal article , Review
- Relation: Energies Vol. 16, no. 20 (2023), p.
- Full Text:
- Reviewed:
- Description: Positive displacement compressors are essential in many engineering systems, from domestic to industrial applications. Many studies have been devoted to providing more insights into the workings and proposing solutions for performance improvements of these machines. This study aims to present a systematic review of published research on positive displacement compressors of various geometrical structures. This paper discusses the literature on compressor topics, including leakage, heat transfer, friction and lubrication, valve dynamics, port characteristics, and capacity control strategies. Moreover, the current status of the application of machine learning methods in positive displacement compressors is also discussed. The challenges and opportunities for future work are presented at the end of the paper. © 2023 by the authors.
A novel dynamic software-defined networking approach to neutralize traffic burst
- Sharma, Aakanksha, Balasubramanian, Venki, Kamruzzaman, Joarder
- Authors: Sharma, Aakanksha , Balasubramanian, Venki , Kamruzzaman, Joarder
- Date: 2023
- Type: Text , Journal article
- Relation: Computers Vol. 12, no. 7 (2023), p.
- Full Text:
- Reviewed:
- Description: Software-defined networks (SDN) has a holistic view of the network. It is highly suitable for handling dynamic loads in the traditional network with a minimal update in the network infrastructure. However, the standard SDN architecture control plane has been designed for single or multiple distributed SDN controllers facing severe bottleneck issues. Our initial research created a reference model for the traditional network, using the standard SDN (referred to as SDN hereafter) in a network simulator called NetSim. Based on the network traffic, the reference models consisted of light, modest and heavy networks depending on the number of connected IoT devices. Furthermore, a priority scheduling and congestion control algorithm is proposed in the standard SDN, named extended SDN (eSDN), which minimises congestion and performs better than the standard SDN. However, the enhancement was suitable only for the small-scale network because, in a large-scale network, the eSDN does not support dynamic SDN controller mapping. Often, the same SDN controller gets overloaded, leading to a single point of failure. Our literature review shows that most proposed solutions are based on static SDN controller deployment without considering flow fluctuations and traffic bursts that lead to a lack of load balancing among the SDN controllers in real-time, eventually increasing the network latency. Therefore, to maintain the Quality of Service (QoS) in the network, it becomes imperative for the static SDN controller to neutralise the on-the-fly traffic burst. Thus, our novel dynamic controller mapping algorithm with multiple-controller placement in the SDN is critical to solving the identified issues. In dSDN, the SDN controllers are mapped dynamically with the load fluctuation. If any SDN controller reaches its maximum threshold, the rest of the traffic will be diverted to another controller, significantly reducing delay and enhancing the overall performance. Our technique considers the latency and load fluctuation in the network and manages the situations where static mapping is ineffective in dealing with the dynamic flow variation. © 2023 by the authors.
- Authors: Sharma, Aakanksha , Balasubramanian, Venki , Kamruzzaman, Joarder
- Date: 2023
- Type: Text , Journal article
- Relation: Computers Vol. 12, no. 7 (2023), p.
- Full Text:
- Reviewed:
- Description: Software-defined networks (SDN) has a holistic view of the network. It is highly suitable for handling dynamic loads in the traditional network with a minimal update in the network infrastructure. However, the standard SDN architecture control plane has been designed for single or multiple distributed SDN controllers facing severe bottleneck issues. Our initial research created a reference model for the traditional network, using the standard SDN (referred to as SDN hereafter) in a network simulator called NetSim. Based on the network traffic, the reference models consisted of light, modest and heavy networks depending on the number of connected IoT devices. Furthermore, a priority scheduling and congestion control algorithm is proposed in the standard SDN, named extended SDN (eSDN), which minimises congestion and performs better than the standard SDN. However, the enhancement was suitable only for the small-scale network because, in a large-scale network, the eSDN does not support dynamic SDN controller mapping. Often, the same SDN controller gets overloaded, leading to a single point of failure. Our literature review shows that most proposed solutions are based on static SDN controller deployment without considering flow fluctuations and traffic bursts that lead to a lack of load balancing among the SDN controllers in real-time, eventually increasing the network latency. Therefore, to maintain the Quality of Service (QoS) in the network, it becomes imperative for the static SDN controller to neutralise the on-the-fly traffic burst. Thus, our novel dynamic controller mapping algorithm with multiple-controller placement in the SDN is critical to solving the identified issues. In dSDN, the SDN controllers are mapped dynamically with the load fluctuation. If any SDN controller reaches its maximum threshold, the rest of the traffic will be diverted to another controller, significantly reducing delay and enhancing the overall performance. Our technique considers the latency and load fluctuation in the network and manages the situations where static mapping is ineffective in dealing with the dynamic flow variation. © 2023 by the authors.
Adaptive phase-field modelling of fracture propagation in poroelastic media using the scaled boundary finite element method
- Wijesinghe, Dakshith, Natarajan, Sundararajan, You, Greg, Khandelwal, Manoj, Dyson, Ashley, Song, Chongmin, Ooi, Ean Tat
- Authors: Wijesinghe, Dakshith , Natarajan, Sundararajan , You, Greg , Khandelwal, Manoj , Dyson, Ashley , Song, Chongmin , Ooi, Ean Tat
- Date: 2023
- Type: Text , Journal article
- Relation: Computer Methods in Applied Mechanics and Engineering Vol. 411, no. (2023), p.
- Full Text:
- Reviewed:
- Description: A scaled boundary finite element-based phase field formulation is proposed to model two-dimensional fracture in saturated poroelastic media. The mechanical response of the poroelastic media is simulated following Biot's theory, and the fracture surface evolution is modelled according to the phase field formulation. To avoid the application of fine uniform meshes that are constrained by the element size requirement when adopting phase field models, an adaptive refinement strategy based on quadtree meshes is adopted. The unique advantage of the scaled boundary finite element method is conducive to the application of quadtree adaptivity, as it can be directly formulated on quadtree meshes without the need for any special treatment of hanging nodes. Efficient computation is achieved by exploiting the unique patterns of the quadtree cells. An appropriate scaling is applied to the relevant matrices and vectors according the physical size of the cells in the mesh during the simulations. This avoids repetitive calculations of cells with the same configurations. The proposed model is validated using a benchmark with a known analytical solution. Numerical examples of hydraulic fractures driven by the injected fluid in cracks are modelled to illustrate the capabilities of the proposed model in handling crack propagation problems involving complex geometries. © 2023 The Author(s)
- Authors: Wijesinghe, Dakshith , Natarajan, Sundararajan , You, Greg , Khandelwal, Manoj , Dyson, Ashley , Song, Chongmin , Ooi, Ean Tat
- Date: 2023
- Type: Text , Journal article
- Relation: Computer Methods in Applied Mechanics and Engineering Vol. 411, no. (2023), p.
- Full Text:
- Reviewed:
- Description: A scaled boundary finite element-based phase field formulation is proposed to model two-dimensional fracture in saturated poroelastic media. The mechanical response of the poroelastic media is simulated following Biot's theory, and the fracture surface evolution is modelled according to the phase field formulation. To avoid the application of fine uniform meshes that are constrained by the element size requirement when adopting phase field models, an adaptive refinement strategy based on quadtree meshes is adopted. The unique advantage of the scaled boundary finite element method is conducive to the application of quadtree adaptivity, as it can be directly formulated on quadtree meshes without the need for any special treatment of hanging nodes. Efficient computation is achieved by exploiting the unique patterns of the quadtree cells. An appropriate scaling is applied to the relevant matrices and vectors according the physical size of the cells in the mesh during the simulations. This avoids repetitive calculations of cells with the same configurations. The proposed model is validated using a benchmark with a known analytical solution. Numerical examples of hydraulic fractures driven by the injected fluid in cracks are modelled to illustrate the capabilities of the proposed model in handling crack propagation problems involving complex geometries. © 2023 The Author(s)
An agriprecision decision support system for weed management in pastures
- Chegini, Hossein, Naha, Ranesh, Mahanti, Aniket, Gong, Mingwei, Passi, Kalpdrum
- Authors: Chegini, Hossein , Naha, Ranesh , Mahanti, Aniket , Gong, Mingwei , Passi, Kalpdrum
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 92660-92675
- Full Text:
- Reviewed:
- Description: Pastures are a vital source of dairy products and cattle nutrition, and as such, play a significant role in New Zealand's agricultural economy. However, weeds can be a major problem for pastures, making it a challenge for dairy farmers to monitor and control them. Currently, most of the tasks for weed management are done manually, and farmers lack persistent technology for weed control. This motivated us to design, implement, and evaluate a Decision Support System (DSS) to detect weeds in pastures and provide decisions for the cleanup of weeds. Our proposed system uses two primary inputs: weeds and bare patches. We created a synthetic dataset to train a weed detection model and designed a fuzzy inference system to assess a pasture. We also used a neuro-fuzzy system in our DSS to evaluate our fuzzy model and tune its parameters for better functioning and accuracy. Our work aims to assist dairy farmers in better weed monitoring, as well as to provide 2D maps of weed density and yield score, which can be of significant value when no digital and meaningful images of pastures exist. The system can also support farmers in scheduling, recommending prohibitive tasks, and storing historical data for pasture analysis, collaborated by stakeholders. © 2013 IEEE.
- Authors: Chegini, Hossein , Naha, Ranesh , Mahanti, Aniket , Gong, Mingwei , Passi, Kalpdrum
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 92660-92675
- Full Text:
- Reviewed:
- Description: Pastures are a vital source of dairy products and cattle nutrition, and as such, play a significant role in New Zealand's agricultural economy. However, weeds can be a major problem for pastures, making it a challenge for dairy farmers to monitor and control them. Currently, most of the tasks for weed management are done manually, and farmers lack persistent technology for weed control. This motivated us to design, implement, and evaluate a Decision Support System (DSS) to detect weeds in pastures and provide decisions for the cleanup of weeds. Our proposed system uses two primary inputs: weeds and bare patches. We created a synthetic dataset to train a weed detection model and designed a fuzzy inference system to assess a pasture. We also used a neuro-fuzzy system in our DSS to evaluate our fuzzy model and tune its parameters for better functioning and accuracy. Our work aims to assist dairy farmers in better weed monitoring, as well as to provide 2D maps of weed density and yield score, which can be of significant value when no digital and meaningful images of pastures exist. The system can also support farmers in scheduling, recommending prohibitive tasks, and storing historical data for pasture analysis, collaborated by stakeholders. © 2013 IEEE.
Application of various robust techniques to study and evaluate the role of effective parameters on rock fragmentation
- Mehrdanesh, Amirhossein, Monjezi, Masoud, Khandelwal, Manoj, Bayat, Parichehr
- Authors: Mehrdanesh, Amirhossein , Monjezi, Masoud , Khandelwal, Manoj , Bayat, Parichehr
- Date: 2023
- Type: Text , Journal article
- Relation: Engineering with Computers Vol. 39, no. 2 (2023), p. 1317-1327
- Full Text:
- Reviewed:
- Description: In this paper, an attempt has been made to implement various robust techniques to predict rock fragmentation due to blasting in open pit mines using effective parameters. As rock fragmentation prediction is very complex and complicated, and due to that various artificial intelligence-based techniques, such as artificial neural network (ANN), classification and regression tree and support vector machines were selected for the modeling. To validate and compare the prediction results, conventional multivariate regression analysis was also utilized on the same data sets. Since accuracy and generality of the modeling is dependent on the number of inputs, it was tried to collect enough required information from four different open pit mines of Iran. According to the obtained results, it was revealed that ANN with a determination coefficient of 0.986 is the most precise method of modeling as compared to the other applied techniques. Also, based on the performed sensitivity analysis, it was observed that the most prevailing parameters on the rock fragmentation are rock quality designation, Schmidt hardness value, mean in-situ block size and the minimum effective ones are hole diameter, burden and spacing. The advantage of back propagation neural network technique for using in this study compared to other soft computing methods is that they are able to describe complex and nonlinear multivariable problems in a transparent way. Furthermore, ANN can be used as a first approach, where much knowledge about the influencing parameters are missing. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.
- Authors: Mehrdanesh, Amirhossein , Monjezi, Masoud , Khandelwal, Manoj , Bayat, Parichehr
- Date: 2023
- Type: Text , Journal article
- Relation: Engineering with Computers Vol. 39, no. 2 (2023), p. 1317-1327
- Full Text:
- Reviewed:
- Description: In this paper, an attempt has been made to implement various robust techniques to predict rock fragmentation due to blasting in open pit mines using effective parameters. As rock fragmentation prediction is very complex and complicated, and due to that various artificial intelligence-based techniques, such as artificial neural network (ANN), classification and regression tree and support vector machines were selected for the modeling. To validate and compare the prediction results, conventional multivariate regression analysis was also utilized on the same data sets. Since accuracy and generality of the modeling is dependent on the number of inputs, it was tried to collect enough required information from four different open pit mines of Iran. According to the obtained results, it was revealed that ANN with a determination coefficient of 0.986 is the most precise method of modeling as compared to the other applied techniques. Also, based on the performed sensitivity analysis, it was observed that the most prevailing parameters on the rock fragmentation are rock quality designation, Schmidt hardness value, mean in-situ block size and the minimum effective ones are hole diameter, burden and spacing. The advantage of back propagation neural network technique for using in this study compared to other soft computing methods is that they are able to describe complex and nonlinear multivariable problems in a transparent way. Furthermore, ANN can be used as a first approach, where much knowledge about the influencing parameters are missing. © 2021, The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature.
Applications of machine learning and deep learning in antenna design, optimization, and selection : a review
- Sarker, Nayan, Podder, Prajoy, Mondal, M., Shafin, Sakib, Kamruzzaman, Joarder
- Authors: Sarker, Nayan , Podder, Prajoy , Mondal, M. , Shafin, Sakib , Kamruzzaman, Joarder
- Date: 2023
- Type: Text , Journal article , Review
- Relation: IEEE Access Vol. 11, no. (2023), p. 103890-103915
- Full Text:
- Reviewed:
- Description: This review paper provides an overview of the latest developments in artificial intelligence (AI)-based antenna design and optimization for wireless communications. Machine learning (ML) and deep learning (DL) algorithms are applied to antenna engineering to improve the efficiency of the design and optimization processes. The review discusses the use of electromagnetic (EM) simulators such as computer simulation technology (CST) and high-frequency structure simulator (HFSS) for ML and DL-based antenna design, which also covers reinforcement learning (RL)-bases approaches. Various antenna optimization methods including parallel optimization, single and multi-objective optimization, variable fidelity optimization, multilayer ML-assisted optimization, and surrogate-based optimization are discussed. The review also covers the AI-based antenna selection approaches for wireless applications. To support the automation of antenna engineering, the data generation technique with computational electromagnetics software is described and some useful datasets are reported. The review concludes that ML/DL can enhance antenna behavior prediction, reduce the number of simulations, improve computer efficiency, and speed up the antenna design process. © 2013 IEEE.
- Authors: Sarker, Nayan , Podder, Prajoy , Mondal, M. , Shafin, Sakib , Kamruzzaman, Joarder
- Date: 2023
- Type: Text , Journal article , Review
- Relation: IEEE Access Vol. 11, no. (2023), p. 103890-103915
- Full Text:
- Reviewed:
- Description: This review paper provides an overview of the latest developments in artificial intelligence (AI)-based antenna design and optimization for wireless communications. Machine learning (ML) and deep learning (DL) algorithms are applied to antenna engineering to improve the efficiency of the design and optimization processes. The review discusses the use of electromagnetic (EM) simulators such as computer simulation technology (CST) and high-frequency structure simulator (HFSS) for ML and DL-based antenna design, which also covers reinforcement learning (RL)-bases approaches. Various antenna optimization methods including parallel optimization, single and multi-objective optimization, variable fidelity optimization, multilayer ML-assisted optimization, and surrogate-based optimization are discussed. The review also covers the AI-based antenna selection approaches for wireless applications. To support the automation of antenna engineering, the data generation technique with computational electromagnetics software is described and some useful datasets are reported. The review concludes that ML/DL can enhance antenna behavior prediction, reduce the number of simulations, improve computer efficiency, and speed up the antenna design process. © 2013 IEEE.
Bundle enrichment method for nonsmooth difference of convex programming problems
- Gaudioso, Manilo, Taheri, Sona, Bagirov, Adil, Karmitsa, Napsu
- Authors: Gaudioso, Manilo , Taheri, Sona , Bagirov, Adil , Karmitsa, Napsu
- Date: 2023
- Type: Text , Journal article
- Relation: Algorithms Vol. 16, no. 8 (2023), p.
- Relation: http://purl.org/au-research/grants/arc/DP190100580
- Full Text:
- Reviewed:
- Description: The Bundle Enrichment Method (BEM-DC) is introduced for solving nonsmooth difference of convex (DC) programming problems. The novelty of the method consists of the dynamic management of the bundle. More specifically, a DC model, being the difference of two convex piecewise affine functions, is formulated. The (global) minimization of the model is tackled by solving a set of convex problems whose cardinality depends on the number of linearizations adopted to approximate the second DC component function. The new bundle management policy distributes the information coming from previous iterations to separately model the DC components of the objective function. Such a distribution is driven by the sign of linearization errors. If the displacement suggested by the model minimization provides no sufficient decrease of the objective function, then the temporary enrichment of the cutting plane approximation of just the first DC component function takes place until either the termination of the algorithm is certified or a sufficient decrease is achieved. The convergence of the BEM-DC method is studied, and computational results on a set of academic test problems with nonsmooth DC objective functions are provided. © 2023 by the authors.
- Authors: Gaudioso, Manilo , Taheri, Sona , Bagirov, Adil , Karmitsa, Napsu
- Date: 2023
- Type: Text , Journal article
- Relation: Algorithms Vol. 16, no. 8 (2023), p.
- Relation: http://purl.org/au-research/grants/arc/DP190100580
- Full Text:
- Reviewed:
- Description: The Bundle Enrichment Method (BEM-DC) is introduced for solving nonsmooth difference of convex (DC) programming problems. The novelty of the method consists of the dynamic management of the bundle. More specifically, a DC model, being the difference of two convex piecewise affine functions, is formulated. The (global) minimization of the model is tackled by solving a set of convex problems whose cardinality depends on the number of linearizations adopted to approximate the second DC component function. The new bundle management policy distributes the information coming from previous iterations to separately model the DC components of the objective function. Such a distribution is driven by the sign of linearization errors. If the displacement suggested by the model minimization provides no sufficient decrease of the objective function, then the temporary enrichment of the cutting plane approximation of just the first DC component function takes place until either the termination of the algorithm is certified or a sufficient decrease is achieved. The convergence of the BEM-DC method is studied, and computational results on a set of academic test problems with nonsmooth DC objective functions are provided. © 2023 by the authors.
Construction of generalized shape functions over arbitrary polytopes based on scaled boundary finite element method's solution of Poisson's equation
- Xiao, B., Natarajan, Sundararajan, Birk, Carolin, Ooi, Ean Hin, Song, Chongmin, Ooi, Ean Tat
- Authors: Xiao, B. , Natarajan, Sundararajan , Birk, Carolin , Ooi, Ean Hin , Song, Chongmin , Ooi, Ean Tat
- Date: 2023
- Type: Text , Journal article
- Relation: International Journal for Numerical Methods in Engineering Vol. 124, no. 17 (2023), p. 3603-3636
- Full Text:
- Reviewed:
- Description: A general technique to develop arbitrary-sided polygonal elements based on the scaled boundary finite element method is presented. Shape functions are derived from the solution of the Poisson's equation in contrast to the well-known Laplace shape functions that are only linearly complete. The application of the Poisson shape functions can be complete up to any specific order. The shape functions retain the advantage of the scaled boundary finite element method allowing direct formulation on polygons with arbitrary number of sides and quadtree meshes. The resulting formulation is similar to the finite element method where each field variable is interpolated by the same set of shape functions in parametric space and differs only in the integration of the stiffness and mass matrices. Well-established finite element procedures can be applied with the developed shape functions, to solve a variety of engineering problems including, for example, coupled field problems, phase field fracture, and addressing volumetric locking in the near-incompressibility limit by adopting a mixed formulation. Application of the formulation is demonstrated in several engineering problems. Optimal convergence rates are observed. © 2023 The Authors. International Journal for Numerical Methods in Engineering published by John Wiley & Sons Ltd.
- Authors: Xiao, B. , Natarajan, Sundararajan , Birk, Carolin , Ooi, Ean Hin , Song, Chongmin , Ooi, Ean Tat
- Date: 2023
- Type: Text , Journal article
- Relation: International Journal for Numerical Methods in Engineering Vol. 124, no. 17 (2023), p. 3603-3636
- Full Text:
- Reviewed:
- Description: A general technique to develop arbitrary-sided polygonal elements based on the scaled boundary finite element method is presented. Shape functions are derived from the solution of the Poisson's equation in contrast to the well-known Laplace shape functions that are only linearly complete. The application of the Poisson shape functions can be complete up to any specific order. The shape functions retain the advantage of the scaled boundary finite element method allowing direct formulation on polygons with arbitrary number of sides and quadtree meshes. The resulting formulation is similar to the finite element method where each field variable is interpolated by the same set of shape functions in parametric space and differs only in the integration of the stiffness and mass matrices. Well-established finite element procedures can be applied with the developed shape functions, to solve a variety of engineering problems including, for example, coupled field problems, phase field fracture, and addressing volumetric locking in the near-incompressibility limit by adopting a mixed formulation. Application of the formulation is demonstrated in several engineering problems. Optimal convergence rates are observed. © 2023 The Authors. International Journal for Numerical Methods in Engineering published by John Wiley & Sons Ltd.
Critical data detection for dynamically adjustable product quality in IIoT-enabled manufacturing
- Sen, Sachin, Karmakar, Gour, Pang, Shaoning
- Authors: Sen, Sachin , Karmakar, Gour , Pang, Shaoning
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 49464-49480
- Full Text:
- Reviewed:
- Description: The IIoT technologies, due to the widespread use of sensors, generate massive data that are key in providing innovative and efficient industrial management, operation, and product quality control processes. The significance of data has prompted relevant research communities and application developers how to harness the values of these data in secure manufacturing. Critical data analysis, identification of critical factors to improve the manufacturing process and critical data associated with product quality have been investigated in the current literature. However, the current works on product quality control are mainly based on static data analysis, where data may change, but there is no way to adjust them dynamically. Thus, they are not applicable for product quality control, at which point their adjustment is instantly required. However, many manufacturing systems exist, like beverages and food, where ingredients must be adjusted instantaneously to maintain product quality. To address this research gap, we introduce a method that identifies the critical data based on their ranking by exploiting three criticality assessment criteria that capture the instantaneous product quality change during manufacturing. These three criteria are - (1) correlation, (2) percentage quality change and (3) sensitivity for the assessment of data criticality. The product quality is estimated using polynomial regression (POLY), SVM, and DNN. The proposed method is validated using wine manufacturing data. Our proposed method accurately identifies critical data, where SVM produces the lowest average production quality prediction error (10.40%) compared with that of POLY (11%) and DNN (14.40%). © 2013 IEEE.
- Authors: Sen, Sachin , Karmakar, Gour , Pang, Shaoning
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 49464-49480
- Full Text:
- Reviewed:
- Description: The IIoT technologies, due to the widespread use of sensors, generate massive data that are key in providing innovative and efficient industrial management, operation, and product quality control processes. The significance of data has prompted relevant research communities and application developers how to harness the values of these data in secure manufacturing. Critical data analysis, identification of critical factors to improve the manufacturing process and critical data associated with product quality have been investigated in the current literature. However, the current works on product quality control are mainly based on static data analysis, where data may change, but there is no way to adjust them dynamically. Thus, they are not applicable for product quality control, at which point their adjustment is instantly required. However, many manufacturing systems exist, like beverages and food, where ingredients must be adjusted instantaneously to maintain product quality. To address this research gap, we introduce a method that identifies the critical data based on their ranking by exploiting three criticality assessment criteria that capture the instantaneous product quality change during manufacturing. These three criteria are - (1) correlation, (2) percentage quality change and (3) sensitivity for the assessment of data criticality. The product quality is estimated using polynomial regression (POLY), SVM, and DNN. The proposed method is validated using wine manufacturing data. Our proposed method accurately identifies critical data, where SVM produces the lowest average production quality prediction error (10.40%) compared with that of POLY (11%) and DNN (14.40%). © 2013 IEEE.
Defending SDN against packet injection attacks using deep learning
- Phu, Anh, Li, Bo, Ullah, Faheem, Ul Huque, Tanvir, Naha, Ranesh, Babar, Muhammad, Nguyen, Hung
- Authors: Phu, Anh , Li, Bo , Ullah, Faheem , Ul Huque, Tanvir , Naha, Ranesh , Babar, Muhammad , Nguyen, Hung
- Date: 2023
- Type: Text , Journal article
- Relation: Computer Networks Vol. 234, no. (2023), p.
- Full Text:
- Reviewed:
- Description: The (logically) centralized architecture of software-defined networks makes them an easy target for packet injection attacks. In these attacks, the attacker injects malicious packets into the SDN network to affect the services and performance of the SDN controller and overflows the capacity of the SDN switches. Such attacks have been shown to ultimately stop the network functioning in real-time, leading to network breakdowns. There have been significant works on detecting and defending against similar DoS attacks in non-SDN networks, but detection and protection techniques for SDN against packet injection attacks are still in their infancy. Furthermore, many of the proposed solutions have been shown to be easily bypassed by simple modifications to the attacking packets or by altering the attacking profile. In this paper, we develop novel Graph Convolutional Neural Network models and algorithms for grouping network nodes/users into security classes by learning from network data. We start with two simple classes — nodes that engage in suspicious packet injection attacks and nodes that are not. From these classes, we then partition the network into separate segments with different security policies using distributed Ryu controllers in an SDN network. We show in experiments on an emulated SDN that our detection solution outperforms alternative approaches with above 99% detection accuracy for various types (both old and new) of injection attacks. More importantly, our mitigation solution maintains continuous functions of non-compromised nodes while isolating compromised/suspicious nodes in real-time. All code and data are publicly available for the reproducibility of our results. © 2023 The Author(s)
- Authors: Phu, Anh , Li, Bo , Ullah, Faheem , Ul Huque, Tanvir , Naha, Ranesh , Babar, Muhammad , Nguyen, Hung
- Date: 2023
- Type: Text , Journal article
- Relation: Computer Networks Vol. 234, no. (2023), p.
- Full Text:
- Reviewed:
- Description: The (logically) centralized architecture of software-defined networks makes them an easy target for packet injection attacks. In these attacks, the attacker injects malicious packets into the SDN network to affect the services and performance of the SDN controller and overflows the capacity of the SDN switches. Such attacks have been shown to ultimately stop the network functioning in real-time, leading to network breakdowns. There have been significant works on detecting and defending against similar DoS attacks in non-SDN networks, but detection and protection techniques for SDN against packet injection attacks are still in their infancy. Furthermore, many of the proposed solutions have been shown to be easily bypassed by simple modifications to the attacking packets or by altering the attacking profile. In this paper, we develop novel Graph Convolutional Neural Network models and algorithms for grouping network nodes/users into security classes by learning from network data. We start with two simple classes — nodes that engage in suspicious packet injection attacks and nodes that are not. From these classes, we then partition the network into separate segments with different security policies using distributed Ryu controllers in an SDN network. We show in experiments on an emulated SDN that our detection solution outperforms alternative approaches with above 99% detection accuracy for various types (both old and new) of injection attacks. More importantly, our mitigation solution maintains continuous functions of non-compromised nodes while isolating compromised/suspicious nodes in real-time. All code and data are publicly available for the reproducibility of our results. © 2023 The Author(s)
Device agent assisted blockchain leveraged framework for Internet of Things
- Nasrullah, Tarique, Islam, Md Manowarul, Uddin, Md Ashraf, Khan, Md Anisauzzaman, Layek, Md Abu, Stranieri, Andrew, Huh, Eui-Nam
- Authors: Nasrullah, Tarique , Islam, Md Manowarul , Uddin, Md Ashraf , Khan, Md Anisauzzaman , Layek, Md Abu , Stranieri, Andrew , Huh, Eui-Nam
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 1254-1268
- Full Text:
- Reviewed:
- Description: Blockchain (BC) is a burgeoning technology that has emerged as a promising solution to peer-to-peer communication security and privacy challenges. As a revolutionary technology, blockchain has drawn the attention of academics and researchers. Cryptocurrencies have already effectively utilized BC technology. Many researchers have sought to implement this technique in different sectors, including the Internet of Things. To store and manage IoT data, we present in this paper a lightweight BC-based architecture with a modified raft algorithm-based consensus protocol. We designed a Device Agent that executes a novel registration procedure to connect IoT devices to the blockchain. We implemented the framework on Docker using the Go programming language. We have simulated the framework on a Linux environment hosted in the cloud. We have conducted a detailed performance analysis using a variety of measures. The results demonstrate that our suggested solution is suitable for facilitating the management of IoT data with increased security and privacy. In terms of throughput and block generation time, the results indicate that our solution might be 40% to 45% faster than the existing blockchain. © 2013 IEEE.
- Authors: Nasrullah, Tarique , Islam, Md Manowarul , Uddin, Md Ashraf , Khan, Md Anisauzzaman , Layek, Md Abu , Stranieri, Andrew , Huh, Eui-Nam
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 1254-1268
- Full Text:
- Reviewed:
- Description: Blockchain (BC) is a burgeoning technology that has emerged as a promising solution to peer-to-peer communication security and privacy challenges. As a revolutionary technology, blockchain has drawn the attention of academics and researchers. Cryptocurrencies have already effectively utilized BC technology. Many researchers have sought to implement this technique in different sectors, including the Internet of Things. To store and manage IoT data, we present in this paper a lightweight BC-based architecture with a modified raft algorithm-based consensus protocol. We designed a Device Agent that executes a novel registration procedure to connect IoT devices to the blockchain. We implemented the framework on Docker using the Go programming language. We have simulated the framework on a Linux environment hosted in the cloud. We have conducted a detailed performance analysis using a variety of measures. The results demonstrate that our suggested solution is suitable for facilitating the management of IoT data with increased security and privacy. In terms of throughput and block generation time, the results indicate that our solution might be 40% to 45% faster than the existing blockchain. © 2013 IEEE.
Domestic load management with coordinated photovoltaics, battery storage and electric vehicle operation
- Das, Narottam, Haque, Akramul, Zaman, Hasneen, Morsalin, Sayidul, Islam, Syed
- Authors: Das, Narottam , Haque, Akramul , Zaman, Hasneen , Morsalin, Sayidul , Islam, Syed
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 12075-12087
- Full Text:
- Reviewed:
- Description: Coordinated power demand management at residential or domestic levels allows energy participants to efficiently manage load profiles, increase energy efficiency and reduce operational cost. In this paper, a hierarchical coordination framework to optimally manage domestic load using photovoltaic (PV) units, battery-energy-storage-systems (BESs) and electric vehicles (EVs) is presented. The bidirectional power flow of EV with vehicle to grid (V2G) operation manages real-time domestic load profile and takes appropriate coordinated action using its controller when necessary. The proposed system has been applied to a real power distribution network and tested with real load patterns and load dynamics. This also includes various test scenarios and prosumer's preferences e.g., with or without EVs, number of EV owners, number of households, and prosumer's daily activities. This is a combined hybrid system for hierarchical coordination that consists of PV units, BES systems and EVs. The system performance was analyzed with different commercial EV types with charging/ discharging constraints and the result shows that the domestic load demand on the distribution grid during the peak period has been reduced significantly. In the end, this proposed system's performance was compared with the prediction-based test techniques and the financial benefits were estimated. © 2013 IEEE.
- Authors: Das, Narottam , Haque, Akramul , Zaman, Hasneen , Morsalin, Sayidul , Islam, Syed
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 12075-12087
- Full Text:
- Reviewed:
- Description: Coordinated power demand management at residential or domestic levels allows energy participants to efficiently manage load profiles, increase energy efficiency and reduce operational cost. In this paper, a hierarchical coordination framework to optimally manage domestic load using photovoltaic (PV) units, battery-energy-storage-systems (BESs) and electric vehicles (EVs) is presented. The bidirectional power flow of EV with vehicle to grid (V2G) operation manages real-time domestic load profile and takes appropriate coordinated action using its controller when necessary. The proposed system has been applied to a real power distribution network and tested with real load patterns and load dynamics. This also includes various test scenarios and prosumer's preferences e.g., with or without EVs, number of EV owners, number of households, and prosumer's daily activities. This is a combined hybrid system for hierarchical coordination that consists of PV units, BES systems and EVs. The system performance was analyzed with different commercial EV types with charging/ discharging constraints and the result shows that the domestic load demand on the distribution grid during the peak period has been reduced significantly. In the end, this proposed system's performance was compared with the prediction-based test techniques and the financial benefits were estimated. © 2013 IEEE.
Effect of corrosion on the bond behavior of steel-reinforced, alkali-activated slag concrete
- Cui, Yifei, Qu, Shihao, Gao, Kaikai, Tekle, Biruk, Bao, Jiuwen, Zhang, Peng
- Authors: Cui, Yifei , Qu, Shihao , Gao, Kaikai , Tekle, Biruk , Bao, Jiuwen , Zhang, Peng
- Date: 2023
- Type: Text , Journal article
- Relation: Materials Vol. 16, no. 6 (2023), p.
- Full Text:
- Reviewed:
- Description: Alkali-activated slag concrete (ASC) is regarded as one of the most promising sustainable construction materials for replacing ordinary Portland cement concrete (OPC) due to its comparable strength and outstanding durability in challenging environments. In this study, the corrosion of steel bars embedded in ASC and OPC was studied by means of an electrically accelerated corrosion test of steel bars in concrete. Meanwhile, the bond performance of the corroded steel bars embedded in ASC was tested and compared with corresponding OPC groups. The results showed that ASC and OPC behaved differently in terms of bond deterioration. The high chemical resistance of ASC decreased the corrosion of steel bars and, thus, increased the residue bond strength and the bond stiffness. © 2023 by the authors.
- Authors: Cui, Yifei , Qu, Shihao , Gao, Kaikai , Tekle, Biruk , Bao, Jiuwen , Zhang, Peng
- Date: 2023
- Type: Text , Journal article
- Relation: Materials Vol. 16, no. 6 (2023), p.
- Full Text:
- Reviewed:
- Description: Alkali-activated slag concrete (ASC) is regarded as one of the most promising sustainable construction materials for replacing ordinary Portland cement concrete (OPC) due to its comparable strength and outstanding durability in challenging environments. In this study, the corrosion of steel bars embedded in ASC and OPC was studied by means of an electrically accelerated corrosion test of steel bars in concrete. Meanwhile, the bond performance of the corroded steel bars embedded in ASC was tested and compared with corresponding OPC groups. The results showed that ASC and OPC behaved differently in terms of bond deterioration. The high chemical resistance of ASC decreased the corrosion of steel bars and, thus, increased the residue bond strength and the bond stiffness. © 2023 by the authors.
Enhancing ultimate bearing capacity prediction of cohesionless soils beneath shallow foundations with grey box and hybrid AI models
- Kiany, Katayoon, Baghbani, Abolfazl, Abuel-Naga, Hossam, Baghbani, Hasan, Arabani, Mahyar, Shalchian, Mohammad
- Authors: Kiany, Katayoon , Baghbani, Abolfazl , Abuel-Naga, Hossam , Baghbani, Hasan , Arabani, Mahyar , Shalchian, Mohammad
- Date: 2023
- Type: Text , Journal article
- Relation: Algorithms Vol. 16, no. 10 (2023), p.
- Full Text:
- Reviewed:
- Description: This study examines the potential of the soft computing technique, namely, multiple linear regression (MLR), genetic programming (GP), classification and regression trees (CART) and GA-ENN (genetic algorithm-emotional neuron network), to predict the ultimate bearing capacity (UBC) of cohesionless soils beneath shallow foundations. For the first time, two grey-box AI models, GP and CART, and one hybrid AI model, GA-ENN, were used in the literature to predict UBC. The inputs of the model are the width of footing (B), depth of footing (D), footing geometry (ratio of length to width, L/B), unit weight of sand (
- Authors: Kiany, Katayoon , Baghbani, Abolfazl , Abuel-Naga, Hossam , Baghbani, Hasan , Arabani, Mahyar , Shalchian, Mohammad
- Date: 2023
- Type: Text , Journal article
- Relation: Algorithms Vol. 16, no. 10 (2023), p.
- Full Text:
- Reviewed:
- Description: This study examines the potential of the soft computing technique, namely, multiple linear regression (MLR), genetic programming (GP), classification and regression trees (CART) and GA-ENN (genetic algorithm-emotional neuron network), to predict the ultimate bearing capacity (UBC) of cohesionless soils beneath shallow foundations. For the first time, two grey-box AI models, GP and CART, and one hybrid AI model, GA-ENN, were used in the literature to predict UBC. The inputs of the model are the width of footing (B), depth of footing (D), footing geometry (ratio of length to width, L/B), unit weight of sand (
Estimating the mean cutting force of conical picks using random forest with salp swarm algorithm
- Zhou, Jian, Dai, Yong, Tao, Ming, Khandelwal, Manoj, Zhao, Mingsheng, Li, Qiyue
- Authors: Zhou, Jian , Dai, Yong , Tao, Ming , Khandelwal, Manoj , Zhao, Mingsheng , Li, Qiyue
- Date: 2023
- Type: Text , Journal article
- Relation: Results in Engineering Vol. 17, no. (2023), p.
- Full Text:
- Reviewed:
- Description: Conical picks are widely used as cutting tools in shearers and roadheaders, and the mean cutting force (MCF) is one of the important parameters affecting conical pick performance. As MCF depends on a number of parameters and due to that the existing empirical and theoretical formulas and numerical modelling are not sufficient enough and reliable to predict MCF in a proficient manner. So, in this research, a novel intelligent model based on a random forest algorithm (RF) and a heuristic algorithm called the salp swarm algorithm (SSA) have been applied to determine the optimal hyper-parameters in RF, and root mean square error is used as a fitness function. A total of 188 data samples including 50 rock types and seven parameters (tensile strength of the rock
- Authors: Zhou, Jian , Dai, Yong , Tao, Ming , Khandelwal, Manoj , Zhao, Mingsheng , Li, Qiyue
- Date: 2023
- Type: Text , Journal article
- Relation: Results in Engineering Vol. 17, no. (2023), p.
- Full Text:
- Reviewed:
- Description: Conical picks are widely used as cutting tools in shearers and roadheaders, and the mean cutting force (MCF) is one of the important parameters affecting conical pick performance. As MCF depends on a number of parameters and due to that the existing empirical and theoretical formulas and numerical modelling are not sufficient enough and reliable to predict MCF in a proficient manner. So, in this research, a novel intelligent model based on a random forest algorithm (RF) and a heuristic algorithm called the salp swarm algorithm (SSA) have been applied to determine the optimal hyper-parameters in RF, and root mean square error is used as a fitness function. A total of 188 data samples including 50 rock types and seven parameters (tensile strength of the rock
Malicious node detection using machine learning and distributed data storage using blockchain in WSNs
- Nouman, Muhammad, Qasim, Umar, Nasir, Hina, Almasoud, Abdullah, Imran, Muhammad, Javaid, Nadeem
- Authors: Nouman, Muhammad , Qasim, Umar , Nasir, Hina , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 6106-6121
- Full Text:
- Reviewed:
- Description: In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML) classifier, termed as Histogram Gradient Boost (HGB), is employed on the BSs to classify the nodes as malicious or legitimate. In case, the node is found to be malicious, its registration is revoked from the network. Whereas, if a node is found to be legitimate, then its data is stored in an Interplanetary File System (IPFS). IPFS stores the data in the form of chunks and generates hash for the data, which is then stored in blockchain. In addition, Verifiable Byzantine Fault Tolerance (VBFT) is used instead of Proof of Work (PoW) to perform consensus and validate transactions. Also, extensive simulations are performed using the Wireless Sensor Network (WSN) dataset, referred as WSN-DS. The proposed model is evaluated both on the original dataset and the balanced dataset. Furthermore, HGB is compared with other existing classifiers, Adaptive Boost (AdaBoost), Gradient Boost (GB), Linear Discriminant Analysis (LDA), Extreme Gradient Boost (XGB) and ridge, using different performance metrics like accuracy, precision, recall, micro-F1 score and macro-F1 score. The performance evaluation of HGB shows that it outperforms GB, AdaBoost, LDA, XGB and Ridge by 2-4%, 8-10%, 12-14%, 3-5% and 14-16%, respectively. Moreover, the results with balanced dataset are better than those with original dataset. Also, VBFT performs 20-30% better than PoW. Overall, the proposed model performs efficiently in terms of malicious node detection and secure data storage. © 2013 IEEE.
- Authors: Nouman, Muhammad , Qasim, Umar , Nasir, Hina , Almasoud, Abdullah , Imran, Muhammad , Javaid, Nadeem
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 6106-6121
- Full Text:
- Reviewed:
- Description: In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML) classifier, termed as Histogram Gradient Boost (HGB), is employed on the BSs to classify the nodes as malicious or legitimate. In case, the node is found to be malicious, its registration is revoked from the network. Whereas, if a node is found to be legitimate, then its data is stored in an Interplanetary File System (IPFS). IPFS stores the data in the form of chunks and generates hash for the data, which is then stored in blockchain. In addition, Verifiable Byzantine Fault Tolerance (VBFT) is used instead of Proof of Work (PoW) to perform consensus and validate transactions. Also, extensive simulations are performed using the Wireless Sensor Network (WSN) dataset, referred as WSN-DS. The proposed model is evaluated both on the original dataset and the balanced dataset. Furthermore, HGB is compared with other existing classifiers, Adaptive Boost (AdaBoost), Gradient Boost (GB), Linear Discriminant Analysis (LDA), Extreme Gradient Boost (XGB) and ridge, using different performance metrics like accuracy, precision, recall, micro-F1 score and macro-F1 score. The performance evaluation of HGB shows that it outperforms GB, AdaBoost, LDA, XGB and Ridge by 2-4%, 8-10%, 12-14%, 3-5% and 14-16%, respectively. Moreover, the results with balanced dataset are better than those with original dataset. Also, VBFT performs 20-30% better than PoW. Overall, the proposed model performs efficiently in terms of malicious node detection and secure data storage. © 2013 IEEE.
Modeling cyclic crack propagation in concrete using the scaled boundary finite element method coupled with the cumulative damage-plasticity constitutive law
- Alrayes, Omar, Könke, Carsten, Ooi, Ean Tat, Hamdia, Khader
- Authors: Alrayes, Omar , Könke, Carsten , Ooi, Ean Tat , Hamdia, Khader
- Date: 2023
- Type: Text , Journal article
- Relation: Materials Vol. 16, no. 2 (2023), p.
- Full Text:
- Reviewed:
- Description: Many concrete structures, such as bridges and wind turbine towers, fail mostly due to the fatigue rapture and bending, where the cracks are initiated and propagate under cyclic loading. Modeling the fracture process zone (FPZ) is essential to understanding the cracking behavior of heterogeneous, quasi-brittle materials such as concrete under monotonic and cyclic actions. The paper aims to present a numerical modeling approach for simulating crack growth using a scaled boundary finite element model (SBFEM). The cohesive traction law is explored to model the stress field under monotonic and cyclic loading conditions. In doing so, a new constitutive law is applied within the cohesive response. The cyclic damage accumulation during loading and unloading is formulated within the thermodynamic framework of the constitutive concrete model. We consider two common problems of three-point bending of a single-edge-notched concrete beam subjected to different loading conditions to validate the developed method. The simulation results show good agreement with experimental test measurements from the literature. The presented analysis can provide a further understanding of crack growth and damage accumulation within the cohesive response, and the SBFEM makes it possible to identify the fracture behavior of cyclic crack propagation in concrete members. © 2023 by the authors.
- Authors: Alrayes, Omar , Könke, Carsten , Ooi, Ean Tat , Hamdia, Khader
- Date: 2023
- Type: Text , Journal article
- Relation: Materials Vol. 16, no. 2 (2023), p.
- Full Text:
- Reviewed:
- Description: Many concrete structures, such as bridges and wind turbine towers, fail mostly due to the fatigue rapture and bending, where the cracks are initiated and propagate under cyclic loading. Modeling the fracture process zone (FPZ) is essential to understanding the cracking behavior of heterogeneous, quasi-brittle materials such as concrete under monotonic and cyclic actions. The paper aims to present a numerical modeling approach for simulating crack growth using a scaled boundary finite element model (SBFEM). The cohesive traction law is explored to model the stress field under monotonic and cyclic loading conditions. In doing so, a new constitutive law is applied within the cohesive response. The cyclic damage accumulation during loading and unloading is formulated within the thermodynamic framework of the constitutive concrete model. We consider two common problems of three-point bending of a single-edge-notched concrete beam subjected to different loading conditions to validate the developed method. The simulation results show good agreement with experimental test measurements from the literature. The presented analysis can provide a further understanding of crack growth and damage accumulation within the cohesive response, and the SBFEM makes it possible to identify the fracture behavior of cyclic crack propagation in concrete members. © 2023 by the authors.
Multi-aspect annotation and analysis of Nepali tweets on anti-establishment election discourse
- Rauniyar, Kritesh, Poudel, Sweta, Shiwakoti, Shuvam, Thapa, Surendrabikram, Rashid, Junaid, Kim, Jungeun, Imran, Muhammad, Naseem, Usman
- Authors: Rauniyar, Kritesh , Poudel, Sweta , Shiwakoti, Shuvam , Thapa, Surendrabikram , Rashid, Junaid , Kim, Jungeun , Imran, Muhammad , Naseem, Usman
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 143092-143115
- Full Text:
- Reviewed:
- Description: In today's social media-dominated landscape, digital platforms wield substantial influence over public opinion, particularly during crucial political events such as electoral processes. These platforms become hubs for diverse discussions, encompassing topics, reforms, and desired changes. Notably, in times of government dissatisfaction, they serve as arenas for anti-establishment discourse, highlighting the need to analyze public sentiment in these conversations. However, the analysis of such discourse is notably scarce, even in high-resource languages, and entirely non-existent in the context of the Nepali language. To address this critical gap, we present Nepal Anti Establishment discourse Tweets (NAET), a novel dataset comprising 4,445 multi-aspect annotated Nepali tweets, facilitating a comprehensive understanding of political conversations. Our contributions encompass evaluating tweet relevance, sentiment, and satire, while also exploring the presence of hate speech, identifying its targets, and distinguishing directed and non-directed expressions. Additionally, we investigate hope speech, an underexplored aspect crucial in the context of anti-establishment discourse, as it reflects the aspirations and expectations from new political figures and parties. Furthermore, we set NLP-based baselines for all these tasks. To ensure a holistic analysis, we also employ topic modeling, a powerful technique that helps us identify and understand the prevalent themes and patterns emerging from the discourse. Our research thus presents a comprehensive and multi-faceted perspective on anti-establishment election discourse in a low-resource language setting. The dataset is publicly available, facilitating in-depth analysis of political tweets in Nepali discourse and further advancing NLP research for the Nepali language through labeled data and baselines for various NLP tasks. The dataset for this work is made available at https://github.com/rkritesh210/NAET. © 2013 IEEE.
- Authors: Rauniyar, Kritesh , Poudel, Sweta , Shiwakoti, Shuvam , Thapa, Surendrabikram , Rashid, Junaid , Kim, Jungeun , Imran, Muhammad , Naseem, Usman
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Access Vol. 11, no. (2023), p. 143092-143115
- Full Text:
- Reviewed:
- Description: In today's social media-dominated landscape, digital platforms wield substantial influence over public opinion, particularly during crucial political events such as electoral processes. These platforms become hubs for diverse discussions, encompassing topics, reforms, and desired changes. Notably, in times of government dissatisfaction, they serve as arenas for anti-establishment discourse, highlighting the need to analyze public sentiment in these conversations. However, the analysis of such discourse is notably scarce, even in high-resource languages, and entirely non-existent in the context of the Nepali language. To address this critical gap, we present Nepal Anti Establishment discourse Tweets (NAET), a novel dataset comprising 4,445 multi-aspect annotated Nepali tweets, facilitating a comprehensive understanding of political conversations. Our contributions encompass evaluating tweet relevance, sentiment, and satire, while also exploring the presence of hate speech, identifying its targets, and distinguishing directed and non-directed expressions. Additionally, we investigate hope speech, an underexplored aspect crucial in the context of anti-establishment discourse, as it reflects the aspirations and expectations from new political figures and parties. Furthermore, we set NLP-based baselines for all these tasks. To ensure a holistic analysis, we also employ topic modeling, a powerful technique that helps us identify and understand the prevalent themes and patterns emerging from the discourse. Our research thus presents a comprehensive and multi-faceted perspective on anti-establishment election discourse in a low-resource language setting. The dataset is publicly available, facilitating in-depth analysis of political tweets in Nepali discourse and further advancing NLP research for the Nepali language through labeled data and baselines for various NLP tasks. The dataset for this work is made available at https://github.com/rkritesh210/NAET. © 2013 IEEE.