An environment-aware mobility model for wireless ad hoc network
- Authors: Ahmed, Sabbir , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2010
- Type: Text , Journal article
- Relation: Computer Networks Vol. 54, no. 9 (2010), p. 1470-1489
- Full Text: false
- Reviewed:
- Description: Simulation is a cost effective, fast and flexible alternative to test-beds or practical deployment for evaluating the characteristics and potential of mobile ad hoc networks. Since environmental context and mobility have a great impact on the accuracy and efficacy of performance measurement, it is of paramount importance how closely the mobility of a node resembles its movement pattern in a real-world scenario. The existing mobility models mostly assume either free space for deployment and random node movement or the movement pattern does not emulate real-world situation properly in the presence of obstacles because of their generation of restricted paths. This demands for the development of a node movement pattern with accurately representing any obstacle and existing path in a complex and realistic deployment scenario. In this paper, we propose a general mobility model capable of creating a more realistic node movement pattern by exploiting the concept of flexible positioning of anchors. Since the model places anchors depending upon the context of the environment through which nodes are guided to move towards the destination, it is capable of representing any terrain realistically. Furthermore, obstacles of arbitrary shapes with or without doorways and any existing pathways in full or part of the terrain can be incorporated which makes the simulation environment more realistic. A detailed computational complexity has been analyzed and the characteristics of the proposed mobility model in the presence of obstacles in a university campus map with and without signal attenuation are presented which illustrates its significant impact on performance evaluation of wireless ad hoc networks.
Combining segmental semi-Markov models with neural networks for protein secondary structure prediction
- Authors: Bidargaddi, Niranjan , Chetty, Madhu , Kamruzzaman, Joarder
- Date: 2009
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 72, no. 3943-3950 (2009), p.3943-3950
- Full Text: false
- Reviewed:
- Description: Predicting the secondary structure of proteins from a primary sequence alone has been variously approached from either a classification or a generative model perspective. The most prominent classification methods have used neural networks, which involves mappings from a local window of residues in the sequence to the structural state of the central residue in the window, thus capturing the local interactions effectively. However, they fail to capture distant interactions among residues. The generative models based on Bayesian segmentation capture sequence structure relationships using generalized hidden Markov models with explicit state duration. They capture non-local interactions through a joint sequence-structure probability distribution based on structural segments. In this paper, we investigate a combined architecture of Bayesian segmentation at the first stage and neural network at the second stage which captures both local and non-local correlation, to increase the single sequence prediction accuracy. The combined architecture is further enhanced by using neural network optimization and ensemble techniques.
Low-power wide-area networks : design goals, architecture, suitability to use cases and research challenges
- Authors: Buurman, Ben , Kamruzzaman, Joarder , Karmakar, Gour , Islam, Syed
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 17179-17220
- Full Text:
- Reviewed:
- Description: Previous survey articles on Low-Powered Wide-Area Networks (LPWANs) lack a systematic analysis of the design goals of LPWAN and the design decisions adopted by various commercially available and emerging LPWAN technologies, and no study has analysed how their design decisions impact their ability to meet design goals. Assessing a technology's ability to meet design goals is essential in determining suitable technologies for a given application. To address these gaps, we have analysed six prominent design goals and identified the design decisions used to meet each goal in the eight LPWAN technologies, ranging from technical consideration to business model, and determined which specific technique in a design decision will help meet each goal to the greatest extent. System architecture and specifications are presented for those LPWAN solutions, and their ability to meet each design goal is evaluated. We outline seventeen use cases across twelve domains that require large low power network infrastructure and prioritise each design goal's importance to those applications as Low, Moderate, or High. Using these priorities and each technology's suitability for meeting design goals, we suggest appropriate LPWAN technologies for each use case. Finally, a number of research challenges are presented for current and future technologies. © 2013 IEEE.
Trustworthiness of self-driving vehicles for intelligent transportation systems in industry applications
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder , Islam, Syed
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 17, no. 2 (2021), p. 961-970
- Full Text: false
- Reviewed:
- Description: To enhance industrial production and automation, rapid and faster transportation of raw materials and finished products to and from distributed factories, warehouses and outlets are essential. To reduce cost with increased efficiency, this will increasingly see the use of connected and self-driving commercial vehicles fitted with industrial grade sensors on roads, shared with normal and self-driving passenger vehicles. For its wide adoption, the trustworthiness of self-driving vehicles in the intelligent transportation system (ITS) is pivotal. In this article, we introduce a novel model to measure the overall trustworthiness of a self-driving vehicle considering on-Board unit (OBU) components, GPS data and safety messages. In calculating the trustworthiness of individual OBU components, CertainLogic and beta distribution function (BDF) are used. Those trust values are fused using both the dempster-Shafer Theory (DST) and a logical operator of CertainLogic. Results of our simulation show that our proposed method can effectively determine the trust of self-driving vehicles. © 2005-2012 IEEE.
A hybrid of multiobjective evolutionary algorithm and HMM-Fuzzy model for time series prediction
- Authors: Hassan, Md Rafiul , Nath, Gupta , Kirley, Michael , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 81, no. April (2012), p. 1-11
- Full Text: false
- Reviewed:
- Description: In this paper, we introduce a new hybrid of Hidden Markov Model (HMM), Fuzzy Logic and multiobjective Evolutionary Algorithm (EA) for building a fuzzy model to predict non-linear time series data. In this hybrid approach, the HMM's log-likelihood score for each data pattern is used to rank the data and fuzzy rules are generated using the ranked data. We use multiobjective EA to find a range of trade-off solutions between the number of fuzzy rules and the prediction accuracy. The model is tested on a number of benchmark and more recent financial time series data. The experimental results clearly demonstrate that our model is able to generate a reduced number of fuzzy rules with similar (and in some cases better) performance compared with typical data driven fuzzy models reported in the literature.
A HMM-based adaptive fuzzy inference system for stock market forecasting
- Authors: Hassan, Md Rafiul , Ramamohanarao, Kotagiri , Kamruzzaman, Joarder , Rahman, Mustafizur , Hossain, Maruf
- Date: 2013
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 104, no. (2013), p. 10-25
- Full Text: false
- Reviewed:
- Description: In this paper, we propose a new type of adaptive fuzzy inference system with a view to achieve improved performance for forecasting nonlinear time series data by dynamically adapting the fuzzy rules with arrival of new data. The structure of the fuzzy model utilized in the proposed system is developed based on the log-likelihood value of each data vector generated by a trained Hidden Markov Model. As part of its adaptation process, our system checks and computes the parameter values and generates new fuzzy rules as required, in response to new observations for obtaining better performance. In addition, it can also identify the most appropriate fuzzy rule in the system that covers the new data; and thus requires to adapt the parameters of the corresponding rule only, while keeping the rest of the model unchanged. This intelligent adaptive behavior enables our adaptive fuzzy inference system (FIS) to outperform standard FISs. We evaluate the performance of the proposed approach for forecasting stock price indices. The experimental results demonstrate that our approach can predict a number of stock indices, e.g., Dow Jones Industrial (DJI) index, NASDAQ index, Standard and Poor500 (S&P500) index and few other indices from UK (FTSE100), Germany (DAX) , Australia (AORD) and Japan (NIKKEI) stock markets, accurately compared with other existing computational and statistical methods.
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2015
- Type: Text , Journal article
- Relation: Computer Networks Vol. 84, no. (2015), p. 17-31
- Full Text:
- Reviewed:
- Description: In the exclusive-use model of spectrum trading, cognitive radio devices or secondary users can buy spectrum resources from licensed users or primary users for a short or long period of time. Considering such spectrum access, a trading model is introduced where a buyer can select a set of candidate sellers based on their reputation and their offers in fulfilling its requirements, namely, offered signal quality, contract duration, coverage and bandwidth. Similarly, a seller can assess a buyer as a potential trading partner considering the buyer's reliability, which the seller can derive from the buyer's reputation and financial profile. In our scheme, seller reputation or buyer reliability can be either obtained from a reputation brokerage service, if one exists, or calculated using our model. Since in a competitive market, the price of a seller depends on that of other sellers, game theory is used to model the competition among multiple sellers. An optimization technique is used by a buyer to select the best seller(s) and optimize purchase to maximize its utility. This may result in buying from multiple sellers of certain amount of bandwidth from each, depending on price and meeting requirements and budget constraints. Stability of the model is analyzed and performance evaluation shows that it benefits sellers and buyers in terms of profit and throughput, respectively. © 2015 Elsevier B.V. All rights reserved.
Green underwater wireless communications using hybrid optical-acoustic technologies
- Authors: Islam, Kazi , Ahmad, Iftekhar , Habibi, Daryoush , Zahed, M. , Kamruzzaman, Joarder
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Access Vol. 9, no. (2021), p. 85109-85123
- Full Text:
- Reviewed:
- Description: Underwater wireless communication is a rapidly growing field, especially with the recent emergence of technologies such as autonomous underwater vehicles (AUVs) and remotely operated vehicles (ROVs). To support the high-bandwidth applications using these technologies, underwater optics has attracted significant attention, alongside its complementary technology - underwater acoustics. In this paper, we propose a hybrid opto-acoustic underwater wireless communication model that reduces network power consumption and supports high-data rate underwater applications by selecting appropriate communication links in response to varying traffic loads and dynamic weather conditions. Underwater optics offers high data rates and consumes less power. However, due to the severe absorption of light in the medium, the communication range is short in underwater optics. Conversely, acoustics suffers from low data rate and high power consumption, but provides longer communication ranges. Since most underwater equipment relies on battery power, energy-efficient communication is critical for reliable underwater communications. In this work, we derive analytical models for both underwater acoustics and optics, and calculate the required transmit power for reliable communications in various underwater communication environments. We then formulate an optimization problem that minimizes the network power consumption for carrying data from underwater nodes to surface sinks under varying traffic loads and weather conditions. The proposed optimization model can be solved offline periodically, hence the additional computational complexity to find the optimum solution for larger networks is not a limiting factor for practical applications. Our results indicate that the proposed technique yields up to 35% power savings compared to existing opto-acoustic solutions. © 2013 IEEE.
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Authors: Khoda, Mahbub , Imam, Tasadduq , Kamruzzaman, Joarder , Gondal, Iqbal , Rahman, Ashfaqur
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Transactions on Industry Applications Vol.56, no 4. (2020), p. 4415-4424
- Full Text:
- Reviewed:
- Description: Industrial Internet of Things (IIoT) deploys edge devices to act as intermediaries between sensors and actuators and application servers or cloud services. Machine learning models have been widely used to thwart malware attacks in such edge devices. However, these models are vulnerable to adversarial attacks where attackers craft adversarial samples by introducing small perturbations to malware samples to fool a classifier to misclassify them as benign applications. Literature on deep learning networks proposes adversarial retraining as a defense mechanism where adversarial samples are combined with legitimate samples to retrain the classifier. However, existing works select such adversarial samples in a random fashion which degrades the classifier's performance. This work proposes two novel approaches for selecting adversarial samples to retrain a classifier. One, based on the distance from malware cluster center, and the other, based on a probability measure derived from a kernel based learning (KBL). Our experiments show that both of our sample selection methods outperform the random selection method and the KBL selection method improves detection accuracy by 6%. Also, while existing works focus on deep neural networks with respect to adversarial retraining, we additionally assess the impact of such adversarial samples on other classifiers and our proposed selective adversarial retraining approaches show similar performance improvement for these classifiers as well. The outcomes from the study can assist in designing robust security systems for IIoT applications.
A Survey on Behavioral Pattern Mining from Sensor Data in Internet of Things
- Authors: Rashid, Md Mamunur , Kamruzzaman, Joarder , Hassan, Mohammad , Shahriar Shafin, Sakib , Bhuiyan, Md Zakirul
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 33318-33341
- Full Text:
- Reviewed:
- Description: The deployment of large-scale wireless sensor networks (WSNs) for the Internet of Things (IoT) applications is increasing day-by-day, especially with the emergence of smart city services. The sensor data streams generated from these applications are largely dynamic, heterogeneous, and often geographically distributed over large areas. For high-value use in business, industry and services, these data streams must be mined to extract insightful knowledge, such as about monitoring (e.g., discovering certain behaviors over a deployed area) or network diagnostics (e.g., predicting faulty sensor nodes). However, due to the inherent constraints of sensor networks and application requirements, traditional data mining techniques cannot be directly used to mine IoT data streams efficiently and accurately in real-time. In the last decade, a number of works have been reported in the literature proposing behavioral pattern mining algorithms for sensor networks. This paper presents the technical challenges that need to be considered for mining sensor data. It then provides a thorough review of the mining techniques proposed in the recent literature to mine behavioral patterns from sensor data in IoT, and their characteristics and differences are highlighted and compared. We also propose a behavioral pattern mining framework for IoT and discuss possible future research directions in this area. © 2013 IEEE.
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2017
- Type: Text , Journal article
- Relation: Information Sciences Vol. 379, no. (2017), p. 128-145
- Full Text: false
- Reviewed:
- Description: Wireless sensor networks (WSNs) will be an integral part of the future Internet of Things (loT) environment and generate large volumes of data. However, these data would only be of benefit if useful knowledge can be mined from them. A data mining framework for WSNs includes data extraction, storage and mining techniques, and must be efficient and dependable. In this paper, we propose a new type of behavioral pattern mining technique from sensor data called regularly frequent sensor patterns (RFSPs). RFSPs can identify a set of temporally correlated sensors which can reveal significant knowledge from the monitored data. A distributed data extraction model to prepare the data required for mining RFSPs is proposed, as the distributed scheme ensures higher availability through greater redundancy. The tree structure for RFSP is compact requires less memory and can be constructed using only a single scan through the dataset, and the mining technique is efficient with low runtime. Current mining techniques in the literature on sensor data employ a single memory-based sequential approach and hence are not efficient. Moreover, usage of the. MapReduce model for the distributed solution has not been explored extensively. Since MapReduce is becoming the de facto model for computation on large data, we also propose a parallel implementation of the RFSP mining algorithm, called RFSP on Hadoop (RFSP-H), which uses a MapReduce-based framework to gain further efficiency. Experiments conducted to evaluate the compactness and performance of the data extraction model, RFSP-tree and RFSP-H mining show improved results. (C) 2016 Elsevier Inc. All rights reserved.
An analytical approach for voice capacity estimation over WiFi network using ITU-T E-model
- Authors: Siddique, Md , Kamruzzaman, Joarder , Hossain, Md Jahangir
- Date: 2014
- Type: Text , Journal article
- Relation: IEEE Transactions on Multimedia Vol. 16, no. 2 (2014), p. 360-372
- Full Text: false
- Reviewed:
- Description: To ensure customer satisfaction and greater market acceptance, voice over Wi-Fi networks must ensure voice quality under various network parameters, configurations and traffic conditions, and other practical effects, e.g., channel noise, and capturing effects. An accurate voice capacity estimation model considering these factors can greatly assist network designers. In the current work, we propose an analytical model to estimate voice over Internet Protocol (VoIP) capacity over Wi-Fi networks addressing these issues. We employ widely used ITU-T E-model to assess voice quality and VoIP call capacity is presented in the form of an optimization problem with voice quality requirement as a constraint. In particular, we analyze delay and loss in channel access and queue, and their impacts on voice quality. The proposed capacity model is first developed for a single hop wireless local area network (WLAN) and then extended for multihop scenarios. To model real network scenario closely, we also consider channel noise and capture effect, and analyze the impacts of transmission range, interference range, and WLAN radius. In absence of any existing call capacity model that considers all the above factors concomitantly, our proposed model will be extremely useful to network designers and voice capacity planners.