Identification of fake news : a semantic driven technique for transfer domain
- Authors: Ferdush, Jannatul , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal , Das, Raj
- Date: 2023
- Type: Text , Conference paper
- Relation: 29th International Conference on Neural Information Processing, ICONIP 2022, Virtual, online, 22-26 November 2022, Communications in Computer and Information Science Vol. 1793 CCIS, p. 564-575
- Full Text: false
- Reviewed:
- Description: Fake news spreads quickly on online social media and adversely impacts political, social, religious, and economic stability. This necessitates an efficient fake news detector which is now feasible due to advances in natural language processing and artificial intelligence. However, existing fake news detection (FND) systems are built on tokenization, embedding, and structure-based feature extraction, and fail drastically in real life because of the difference in vocabulary and its distribution across various domains. This article evaluates the effectiveness of various categories of traditional features in cross-domain FND and proposes a new method. Our proposed method shows significant improvement over recent methods in the literature for cross-domain fake news detection in terms of widely used performance metrics. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Whose data are reliable : sensor declared data reliability
- Authors: Shafin, Sakib , Karmakar, Gour , Mareels, Iven , Balasubramanian, Venki , Kolluri, Ramachandra
- Date: 2023
- Type: Text , Conference paper
- Relation: 19th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2023, Montreal, Canada, 21-23 June 2023, International Conference on Wireless and Mobile Computing, Networking and Communications Vol. 2023-June, p. 249-254
- Full Text: false
- Reviewed:
- Description: Sensor data is susceptible to faults, noise, and malicious attacks, posing a significant operational and security threat. Therefore, ensuring reliability of sensor data is critical for real-time monitoring systems. Prior research on sensor data reliability relies on edge or upper-layer devices for data fusion from multiple sensors, employing architectures with major overheads and latency due to transmission and storage demands. An alternative approach is to have the sensor estimate and declare its own reliability. While some methods involve sensors computing data confidence and including it in payloads, limitations arise in the absence of neighboring sensor data, and communication overheads are incurred. To address this problem, this paper proposes an innovative approach to enhance the reliability of sensor data using an intelligent self-declaration process. Proposed reliability estimation is evaluate with three lightweight estimation algorithms, namely, Kalman Filter, Holt-Winters Method, and Mahalanobis Distance using sensor's historical data. The reliability level is then added to the three reserved bits of a TCP packet header which results in zero additional overhead. Experiments conducted using real-world sensor data (from water quality monitoring systems) obtained from our IoT lab demonstrate the effectiveness of our proposal and the potential for application in real-world sensor-based applications. © 2023 IEEE.
Image quality assessment metric fusing traditional and dempster-shafer theory
- Authors: Kaur, Roopdeep , Karmakar, Gour
- Date: 2022
- Type: Text , Conference paper
- Relation: 26th International Conference on Pattern Recognition, ICPR 2022 Montréal, 21-25 August 2022, Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, Montreal, QC, Canada, August 21–25, 2022, Proceedings, Part II Vol. 13644 LNCS, p. 482-497
- Full Text: false
- Reviewed:
- Description: Image analysis is being applied in many applications including industrial automation with the Industrial Internet of Things and machine vision. The images captured by cameras, from the outdoor environment are impacted by various parameters such as lens blur, dirty lens and lens distortion (barrel distortion). There exist many approaches that assess the impact of camera parameters on the quality of the images. However, most of these techniques do not use important quality assessment metrics such as Oriented FAST and Rotated BRIEF and Structural Content. None of these techniques objectively evaluate the impact of barrel distortion on the image quality using quality assessment metrics such as Mean Square Error, Peak signal-to-noise ratio, Structural Content, Oriented FAST and Rotated BRIEF and Structural Similarity Index. In this paper, besides lens dirtiness and blurring, we also examine the impact of barrel distortion using various types of dataset having different levels of barrel distortion. Analysis shows none of the existing metrics produces quality values consistent with intuitively defined impact levels for lens blur, dirtiness and barrel distortion. To address the loopholes of existing metrics and make the quality assessment metric more reliable, we present two new image quality assessment metrics. For our combined metric, results show that the maximum values of impact level created by barrel distortion, blurriness and dirtiness are 66.6%, 87.9% and 94.4%, respectively. These results demonstrate the effectiveness of our metric to assess the impact level more accurately. The second approach fuses the quality values obtained from different metrics using a decision fusion technique known as the Dempster-Shafer (DS) theory. Our metric produces quality values that are more consistent and conform with the perceptually defined camera parameter impact levels. For all above-mentioned camera impacts, our metric DS exhibits 100 % assessment reliability, which includes an enormous improvement over other metrics. © 2023, Springer Nature Switzerland AG.
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Authors: Karmakar, Gour , Petty, Mark , Ahmed, Hassan , Das, Rajkumar , Kamruzzaman, Joarder
- Date: 2022
- Type: Text , Conference paper
- Relation: 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2022, Gold Coast, Australia, 18-20 December 2022, Proceedings of IEEE Asia-Pacific Conference on Computer Science and Data Engineering, CSDE 2022
- Full Text: false
- Reviewed:
- Description: Internet of Things (IoT) is enabling us to introduce cost-effective, innovative and intelligent services in business, industrial, and government application domains. Despite these huge potential benefits of IoT applications, since the backbone of IoT is Internet and IoT connects numerous heterogeneous devices, IoT is vulnerable to many different attacks and thus has been a honey pot to the cybercriminals and hackers. For this reason, the attacks against IoT devices are increasing sharply in recent years. To prevent and detect these attacks, ethical hacking of different IoT devices are of paramount importance. This is because the lesson learnt from these ethical hackings can be exploited to develop effective and robust strategies and mitigation approaches to protect IoT devices from these attacks. There exist a few ethical hacking techniques reported in the literature such as hacking Android phones, Windows XP virtual machine and a DNS rebinding attack on IoT devices. In this paper, we implement an approach for the ethical hacking of a Drone and then hijack it. As an outcome of lesson learnt, the mitigation approaches on how to reduce the hacking on a drone is presented in this paper. © 2022 IEEE.
Cybersecurity risks in meat processing plant and impacts on total productive maintenance
- Authors: Chundhoo, Vickram , Chattopadhyay, Gopinath , Karmakar, Gour , Appuhamillage, Gayan
- Date: 2021
- Type: Text , Conference paper
- Relation: 2021 International Conference on Maintenance and Intelligent Asset Management; ICMIAM 2021, Ballarat; 12-15 December 2021
- Full Text: false
- Reviewed:
- Description: Technological changes have been happening in production facilities including food manufacturing industries in an ever-increasing rate. This includes advancement in data capture devices, signal processing, communication capabilities and automated process control systems such as Internet of Things. It is more challenging where production systems are highly reliant on automation and robotics. Remote performance monitoring and controls are becoming progressively vulnerable due to risks associated with cyber security and corporate espionage. May 2021 cyber-Attack forced JBS meats USA to pay 11m in ransom money to stop any further disruptions in services. This heavily impacted JBS global operations including JBS Australian food manufacturing facilities. Food production facilities in Australia have critical control points supported by smart technologies as part of their food safety management systems. Cyber-Attacks on production facilities could result in financial, operational, health and safety consequences. As survey by the Australian Cyber Security Centre in 2020 revealed that Australian small businesses are impacted by cybercime each year with a loss of 300m. To present the potential cyber security threats and their associated risk level, a case study is presented based on the processing and manufacture of meat products in Australia. From this case study, to protect the meat industries from attacks, we identify cyber security attacks and their possible mitigation strategies. This research shows cyber security attacks can severely affect Overall Equipment Effectiveness which motivate us to embed cyber security as an additional pillar in existing 8 pillars Total Productive Maintenance. If cyber security is added as additional pillar, it will improve the quality of end products and overall productivity of manufacturing industries. © 2021 IEEE.
An Enhanced Local Texture Descriptor for Image Segmentation
- Authors: Tania, Sheikh , Murshed, Manzur , Teng, Shyh , Karmakar, Gour
- Date: 2020
- Type: Text , Conference paper
- Relation: 2020 IEEE International Conference on Image Processing, ICIP 2020 Vol. 2020-October, p. 1526-1530
- Full Text: false
- Reviewed:
- Description: Texture is an indispensable property to develop many vision based autonomous applications. Compared to colour, feature dimension in a local texture descriptor is quite large as dense texture features need to represent the distribution of pixel intensities in the neighbourhood of each pixel. Large dimensional features require additional time for further processing that often restrict real-time applications. In this paper, a robust local texture descriptor is enhanced by reducing feature dimension by three folds without compromising the accuracy in region-based image segmentation applications. Reduction in feature dimension is achieved by exploiting the mean of neighbourhood pixel intensities radially along lines across a certain radius, which eliminates the need for sampling intensity distribution at three scales. Both the results of benchmark metrics and computational time are promising when the enhanced texture feature is used in a region-based hierarchical segmentation algorithm, a recent state-of-the-art technique. © 2020 IEEE.
Pre-trained language models with limited data for intent classification
- Authors: Kasthuriarachchy, Buddhika , Chetty, Madhu , Karmakar, Gour , Walls, Darren
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 International Joint Conference on Neural Networks, IJCNN 2020
- Full Text: false
- Reviewed:
- Description: Intent analysis is capturing the attention of both the industry and academia due to its commercial and noncommercial significance. The rapid growth of unstructured data of micro-blogging platforms, such as Twitter and Facebook, are amongst the important sources for intent analysis. However, the social media data are often noisy and diverse, thus making the task very challenging. Further, the intent analysis frequently suffers from lack of sufficient data because the labeled datasets are often manually annotated. Recently, BERT (Bidirectional Encoder Representation from Transformers), a state-of-the-art language representation model, has attracted attention for accurate language modelling. In this paper, we investigate the application of BERT for its suitability for intent analysis. We study the fine-tuning of the BERT model through inductive transfer learning and investigate methods to overcome the challenges due to limited data availability by proposing a novel semantic data augmentation approach. This technique generates synthetic sentences while preserving the label-compatibility using the semantic meaning of the sentences, to improve the intent classification accuracy. Thus, based on the considerations for finetuning and data augmentation, a systematic and novel step-bystep methodology is presented for applying the linguistic model BERT for intent classification with limited data available. Our results show that the pre-trained language can be effectively used with noisy social media data to achieve state-of-the-art accuracy in intent analysis under low labeled-data regime. Moreover, our results also confirm that the proposed text augmentation technique is effective in eliminating noisy synthetic sentences, thereby achieving further performance improvements. © 2020 IEEE.
Assessing transformer oil quality using deep convolutional networks
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
Hierarchical colour image segmentation by leveraging RGB channels independently
- Authors: Tania, Sheikh , Murshed, Manzur , Teng, Shyh , Karmakar, Gour
- Date: 2019
- Type: Text , Conference paper
- Relation: 9th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2019 Vol. 11854 LNCS, p. 197-210
- Full Text:
- Reviewed:
- Description: In this paper, we introduce a hierarchical colour image segmentation based on cuboid partitioning using simple statistical features of the pixel intensities in the RGB channels. Estimating the difference between any two colours is a challenging task. As most of the colour models are not perceptually uniform, investigation of an alternative strategy is highly demanding. To address this issue, for our proposed technique, we present a new concept for colour distance measure based on the inconsistency of pixel intensities of an image which is more compliant to human perception. Constructing a reliable set of superpixels from an image is fundamental for further merging. As cuboid partitioning is a superior candidate to produce superpixels, we use the agglomerative merging to yield the final segmentation results exploiting the outcome of our proposed cuboid partitioning. The proposed cuboid segmentation based algorithm significantly outperforms not only the quadtree-based segmentation but also existing state-of-the-art segmentation algorithms in terms of quality of segmentation for the benchmark datasets used in image segmentation. © 2019, Springer Nature Switzerland AG.
Measuring trustworthiness of IoT image sensor data using other sensors' complementary multimodal data
- Authors: Islam, Mohammad , Karmakar, Gour , Kamruzzaman, Joarder , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 775-780
- Full Text: false
- Reviewed:
- Description: Trust of image sensor data is becoming increasingly important as the Internet of Things (IoT) applications grow from home appliances to surveillance. Up to our knowledge, there exists only one work in literature that estimates trustworthiness of digital images applied to forensic applications, based on a machine learning technique. The efficacy of this technique is heavily dependent on availability of an appropriate training set and adequate variation of IoT sensor data with noise, interference and environmental condition, but availability of such data cannot be assured always. Therefore, to overcome this limitation, a robust method capable of estimating trustworthy measure with high accuracy is needed. Lowering cost of sensors allow many IoT applications to use multiple types of sensors to observe the same event. In such cases, complementary multimodal data of one sensor can be exploited to measure trust level of another sensor data. In this paper, for the first time, we introduce a completely new approach to estimate the trustworthiness of an image sensor data using another sensor's numerical data. We develop a theoretical model using the Dempster-Shafer theory (DST) framework. The efficacy of the proposed model in estimating trust level of an image sensor data is analyzed by observing a fire event using IoT image and temperature sensor data in a residential setup under different scenarios. The proposed model produces highly accurate trust level in all scenarios with authentic and forged image data. © 2019 IEEE.
- Description: E1
Trusted autonomous vehicle : measuring trust using on-board unit data
- Authors: Chowdhury, Abdullahi , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 p. 787-792
- Full Text: false
- Reviewed:
- Description: Vehicular Ad-hoc Networks (VANETs) play an essential role in ensuring safe, reliable and faster transportation with the help of an Intelligent Transportation system. The trustworthiness of vehicles in VANETs is extremely important to ensure the authenticity of messages and traffic information transmitted in extremely dynamic topographical conditions where vehicles move at high speed. False or misleading information may cause substantial traffic congestions, road accidents and may even cost lives. Many approaches exist in literature to measure the trustworthiness of GPS data and messages of an Autonomous Vehicle (AV). To the best of our knowledge, they have not considered the trustworthiness of other On-Board Unit (OBU) components of an AV, along with GPS data and transmitted messages, though they have a substantial relevance in overall vehicle trust measurement. In this paper, we introduce a novel model to measure the overall trustworthiness of an AV considering four different OBU components additionally. The performance of the proposed method is evaluated with a traffic simulation model developed by Simulation of Urban Mobility (SUMO) using realistic traffic data and considering different levels of uncertainty. © 2019 IEEE.
- Description: E1
Passive detection of splicing and copy-move attacks in image forgery
- Authors: Islam, Mohammad , Kamruzzaman, Joarder , Karmakar, Gour , Murshed, Manzur , Kahandawa, Gayan
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th International Conference on Neural Information Processing, ICONIP 2018; Siem Reap, Cambodia; 13th-16th December 2018; published in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 11304 LNCS, p. 555-567
- Full Text:
- Reviewed:
- Description: Internet of Things (IoT) image sensors for surveillance and monitoring, digital cameras, smart phones and social media generate huge volume of digital images every day. Image splicing and copy-move attacks are the most common types of image forgery that can be done very easily using modern photo editing software. Recently, digital forensics has drawn much attention to detect such tampering on images. In this paper, we introduce a novel feature extraction technique, namely Sum of Relevant Inter-Cell Values (SRIV) using which we propose a passive (blind) image forgery detection method based on Discrete Cosine Transformation (DCT) and Local Binary Pattern (LBP). First, the input image is divided into non-overlapping blocks and 2D block DCT is applied to capture the changes of a tampered image in the frequency domain. Then LBP operator is applied to enhance the local changes among the neighbouring DCT coefficients, magnifying the changes in high frequency components resulting from splicing and copy-move attacks. The resulting LBP image is again divided into non-overlapping blocks. Finally, SRIV is applied on the LBP image blocks to extract features which are then fed into a Support Vector Machine (SVM) classifier to identify forged images from authentic ones. Extensive experiment on four well-known benchmark datasets of tampered images reveal the superiority of our method over recent state-of-the-art methods.
Significance level of a big data query by exploiting business processes and strategies
- Authors: Dinh, Loan , Karmakar, Gour , Kamruzzaman, Joarder , Stranieri, Andrew
- Date: 2018
- Type: Text , Conference paper
- Relation: 13th Joint International Baltic Conference on Databases and Information Systems Forum and Doctoral Consortium, Baltic-DB and IS Forum-DC 2018 Vol. 2158, p. 63-73
- Full Text: false
- Reviewed:
- Description: Querying data is one of the most frequent activities in business organisations. The tasks involving queries for big data collection, extraction and analysis have never been easy, because to obtain the high quality responses, the expected outcome from these tasks need to be more accurate and highly relevant to a business organisation. The emergence of big data era has further complicated the task. The enormous volume of data from diverse sources and the variety of queries impose a big challenge on business organisations on how to extract deep insight from big data within acceptable time. Determining significance levels of queries based on their relevance to business organisations is able to deal with such challenge. To address this issue, up to our knowledge, there exists only one approach in the literature to calculate the significance level of a query. However, in this approach, only business processes are considered by manually selecting weights for core and non-core business processes. As the significance level of a query must express the importance of that query to a business organisation, it has to be calculated based on the consideration of business strategic direction, which requires the consideration of both business processes and strategies. This paper proposes an approach for the first time where the significance level of a query is determined by exploiting process contributions and strategy priorities. The results produced by our proposed approach using a business case study show the queries that are associated with more important business processes and higher priority strategies have higher significance levels. This vindicates the application of the significance level in a query to dynamically scale the semantic information use in capturing the appropriate level of deep insight and relevant information required for a business organisation. Copyright © 2018 for this paper by the papers' authors.
Dynamically controlling exterior and interior window coverings through IoT for environmental friendly smart homes
- Authors: Karmakar, Gour , Roy, Soma , Chattopadhyay, Gopinath , Xiao, Zhigang
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 2017 IEEE International Conference on Mechatronics, ICM 2017; Gippsland, Australia; 13th-15th February 2017 p. 487-491
- Full Text: false
- Reviewed:
- Description: Energy saving using smart home is of paramount importance to reduce heating and cooling energy consumption, and promote sustainable environment. Awnings and blinds have exhibited their effectiveness to reduce heating gain in summer and cooling loss in winter, respectively. Awnings are more effective to reduce heat gain in summer than blinds, while the opposite is true in winter. There exist many approaches in the current literature to remotely control flat curtains and blinds. However, up to our knowledge, no automatic technique is available in the literature, which can dynamically control the orientation of an exterior covering so that it can act like a blind in winter and an awning in summer. In this paper, we propose an automatic on-demand system to control the orientation and size of such exterior covering, and the turning air conditioners, heaters and lights on and off considering the rate of change of room temperature, and its lighting condition. We also discuss the properties and design of such exterior covering. A simulation model was developed to analysis the performance of our approach in terms of energy savings both in summer and winter. © 2017 IEEE.
- Description: Proceedings - 2017 IEEE International Conference on Mechatronics, ICM 2017
Exploiting evolving trust relationships in the modelling of opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2017
- Type: Text , Conference proceedings , Conference paper
- Relation: 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017; Taipei, Taiwan; 27th-29th March 2017 p. 872-879
- Full Text: false
- Reviewed:
- Description: Mass participation of the members of a society in discussions to resolve issues related to a topic leads to forming public opinion. The timeline of the underlying dynamics goes through several distinguishable phases, and experiences transition from one to another. After initiated by concerned individuals, it draws active attention from almost everyone, and with time progression, people's participation starts declining as the issues are resolved or lost attraction. The existing works in the literature to capture the opinion formation process pay attention to model the dynamics in its active phase and thus ignore the other phases and the corresponding phase transitions. Trust relationships among the participants dynamically shape their interactions in different stages of the dynamics. Existing works fail to incorporate trust in defining the extent of influence one has on others, as they define the social relationships in the opinion space. To address this issue, we adopt simulated annealing to model the transitional behaviour of the dynamics, and then, amalgamate peoples relationships in the trust space with that in the opinion space to define the meta-heuristics of the algorithm for capturing the dynamical properties of the process. Finally, through simulation, we observe that our model is insightful in representing peoples' evolving behaviour in the different stages of opinion formation process, and consequently, can capture the various properties of the steady-state outcomes of the dynamics. © 2017 IEEE.
- Description: Proceedings - International Conference on Advanced Information Networking and Applications, AINA
Who are convincing? An experience based opinion formation dynamics in online social networks
- Authors: Das, Rajkumar , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2016
- Type: Text , Conference proceedings , Conference paper
- Relation: 30th European Simulation and Modelling Conference, ESM 2016; Las Palmas, Spain; 26th-28th October 2016 p. 167-173
- Full Text: false
- Reviewed:
- Description: Online social network (OSN) is one of the major platforms where our opinions are formed now-a-days and increasing so. Opinion formation dynamics captures the ways public opinions are formed, mainly from two different sources, (i) neighbours' opinions, (ii) external opinions from sources other than the neighbours. In this paper, we formulate an opinion formation model by considering two very important factors, that were ignored or a very little explored in the literature. First, we model the convincing power of the opinions encountered from the two sources. Second, we incorporate the experience of users' previous interactions with the two opinion sources. The problem is formulated as an agent based model where each member of an OSN is represented with an agent and their relationships with a graph. Finally through simulation, we create various scenarios, and apply our model to observe the steady state outcomes of the dynamics. This helps us to study the nature of the public opinions under various influences of our model parameters.
- Description: European Simulation and Modelling Conference 2016, ESM 2016
Content exchange among mobile tourists using users' interest and place-centric activities
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2015
- Type: Text , Conference paper
- Relation: 2015 10th International Conference on Information, Communications and Signal Processing (Icics); Singapore, Singapore; 2nd-4th December 2015 p. 1-5
- Full Text: false
- Reviewed:
- Description: In this work we investigate decentralized content exchange among tourists who are mostly strangers, depicts irregular movement patterns and most likely not to have any prior social relationship or difficult to establish any in a tourist spot. We incorporate user's interest, trustworthy online recommendations, and place-centric information to facilitate content exchange in such tourist destinations. The proposed administrator selection policy considers stay probability in activities, connectivity among nodes and their available resources. We have done extensive simulation using network simulator NS3 on a popular tourist spot in Australia that provides a number of activities. Our proposed approach shows promising results in exchanging contents among users measured in terms of content hit and delivery success rate as well as latency. The success rate is comparable to those reported in the literature for cases where social relationship exist and nodes follow regular predictable movement patterns.
Content sharing among visitors with irregular movement patterns in visiting hotspots
- Authors: Kaisar, Shahriar , Kamruzzaman, Joarder , Karmakar, Gour , Gondal, Iqbal
- Date: 2015
- Type: Text , Conference paper
- Relation: 2015 IEEE 14th International Symposium on Network Computing and Applications (NCA); Cambridge, United States; 28th - 30th September 2015; published in Proceedings - 2015 IEEE 14th International Symposium on Network Computing and Applications, NCA 2015 p. 230-234
- Full Text: false
- Reviewed:
- Description: Smart mobile devices have become immensely popular among the people worldwide and provide a new platform for generating and sharing contents. The centralized and hybrid architectures for content sharing require constant Internet connection, increase traffic and incur costs. To address these issues several content sharing approaches have been proposed using the decentralized architecture. Most of the proposed approaches use spatio-temporal regularity and pre-existing social relationships of the users to predict their movements and facilitate content sharing. However, there are scenarios such as visiting hotspots where regular movement patterns or established social relationships among people might not exist. Content sharing in such scenarios has not been addressed yet in literature and existing prediction based approaches are ineffectual. This study focuses on facilitating content sharing in the afore-mentioned scenarios. We take account of user interests, recommendations from on-line social networks, hotspot specific activities and other relevant information to construct communities which facilitate content sharing. For each community an administrator, who maintains content and member lists and render directory services, is selected based on stay probability, interest score, battery lifetime and device configuration. Simulation results show that our proposed approach attains high content hit and success rate and low latency in delivery which is nearly comparable to those proposed for scenarios with regular predictable movement patterns reported in literature.
An opportunistic message forwarding protocol for underwater acoustic sensor networks
- Authors: Nowsheen, Nusrat , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2013
- Type: Text , Conference paper
- Relation: 2013 19th Asia-Pacific Conference on Communications, APCC 2013; Denpasar; Indonesia; 29th-31st August 2013 p. 1-6
- Full Text: false
- Reviewed:
- Description: Designing message forwarding protocols for underwater acoustic sensor networks (UASNs) is challenging mainly due to high propagation delay, limited bandwidth and high packet loss. Most such protocols operate on the assumption that precise location of sensor nodes is known, which is difficult as GPS waves cannot propagate through water. Moreover, due to the error-prone nature of the acoustic link, message forwarding over multiple hops degrades end-to-end reliability, consumes significant energy and incurs longer delay. In this paper, we propose a location unaware message forwarding technique. It employs opportunistic routing where nodes use accumulate-and-forward paradigm to route data. The technique also exploits nodes' ability to overhear one another's transmission to select reliable route. Our opportunistic model uses independent and local forwarding decisions to select next hop forwarder on-the-fly based on its link transmission reliability and reachability to the gateway. Message ferrying approach is utilized to collect sensor data from gateway nodes of multiple UASNs at high data rate. Our simulation results exhibit its effectiveness and superiority compared with two well established message forwarding algorithms in underwater in terms of packet delivery ratio, routing overhead and energy consumption.
Delay-aware query routing tree for wireless sensor networks
- Authors: Pervin, Shaila , Kamruzzaman, Joarder , Karmakar, Gour
- Date: 2012
- Type: Text , Conference paper
- Full Text: false
- Reviewed:
- Description: Timeliness in query response is the major quality metric for query processing in the real-time applications of Wireless Sensor Networks (WSNs). The structure of the query routing tree directly affects the whole query processing delay as it provides the path to forward a query to the relevant nodes and return the response to the sink. In the current literature, query routing structure is designed irrespective of the variation in query loads among the sensors. As a consequence, current schemes do not guarantee for the routing tree to provide a faster path to the sensors with higher query load. This motivates the current work to consider query load in constructing and self-reconfiguring the routing tree. In this paper, we present a query load-based spanning tree construction method that reduces the query response delay as well as energy consumption in query execution and provides query response with the best possible accuracy. Simulation results illustrate the efficacy of the proposed framework.