A cross-layer approach for QoS topology control in wireless ad hoc networks
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2009
- Type: Text , Conference paper
- Relation: TENCON 2009 - 2009 IEEE Region 10 Conference
- Full Text:
- Reviewed:
- Description: Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting the beamwidth and beam directions to minimize interference and to maximize the number of possible concurrent network communications. This in turn helps to maintain the QoS of the communications. QoS routing has long been used to meet the user requirements by finding appropriate paths to the destinations. We extend this concept to create an adaptive QoS topology control (AQTC) system using smart antennas. We use a cross-layer approach to control the topology dynamically where the topology control layer sits between the MAC and the routing protocol. The performance of our protocol has been evaluated using extensive simulations. Simulation results show that different topologies for a set of communications perform differently. AQTC always forms a topology to facilitate the current communications and improves the network throughput and end-to-end delay.
A cross-layer approach for using multiple radio channels with directional beams in a suburban Ad Hoc network
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2008
- Type: Text , Conference paper
- Relation: Australasian Telecommunication Networks and Applications Conference
- Full Text: false
- Reviewed:
- Description: The capacity of wireless ad hoc networks can be increased by using multiple radio channels. But due to interference the capacity is still not fully utilized. This is caused by the limited number of available radio channels. The interference problem can be reduced using directional beams instead of omni-directional beams. This paper presents a novel cross-layer approach to use multiple radio channels with directional antennas. We are using three different radio channels. Each node has three fixed directional beams having fixed beamwidth and with different radio frequency. Two nodes can communicate when both the sending and receiving beams are pointing towards each other using the same frequency channel. In this study the directions of beams cannot be changed dynamically. A modified version of Ad hoc On-demand Distance Vector (AODV) routing protocol has been used. Simulation results show that our approach outperforms other methods using three different radio channels with omni-directional antennas
A Cultural Competence Organizational Review for community health services : Insights from a participatory approach
- Authors: Truong, Mandy , Gibbs, Lisa , Pradel, Veronika , Morris, Michal , Gwatirisa, Pauline , Tadic, Maryanne , De Silva, Andrea , Hall, Martin , Young, Dana , Riggs, Elisha , Calache, Hanny , Gussy, Mark , Watt, Richard , Gondal, Iqbal , Waters, Elizabeth
- Date: 2017
- Type: Text , Journal article
- Relation: Health Promotion Practice Vol. 18, no. 3 (2017), p. 466-475
- Full Text: false
- Reviewed:
- Description: Cultural competence is an important aspect of health service access and delivery in health promotion and community health. Although a number of frameworks and tools are available to assist health service organizations improve their services to diverse communities, there are few published studies describing organizational cultural competence assessments and the extent to which these tools facilitate cultural competence. This article addresses this gap by describing the development of a cultural competence assessment, intervention, and evaluation tool called the Cultural Competence Organizational Review (CORe) and its implementation in three community sector organizations. Baseline and follow-up staff surveys and document audits were conducted at each participating organization. Process data and organizational documentation were used to evaluate and monitor the experience of CORe within the organizations. Results at follow-up indicated an overall positive trend in organizational cultural competence at each organization in terms of both policy and practice. Organizations that are able to embed actions to improve organizational cultural competence within broader organizational plans increase the likelihood of sustainable changes to policies, procedures, and practice within the organization. The benefits and lessons learned from the implementation of CORe are discussed. © 2017, Society for Public Health Education.
A data mining approach for machine fault diagnosis based on associated frequency patterns
- Authors: Rashid, Md. Mamunur , Amar, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Journal article
- Relation: Applied Intelligence Vol. 45, no. 3 (2016), p. 638-651
- Full Text: false
- Reviewed:
- Description: Bearings play a crucial role in rotational machines and their failure is one of the foremost causes of breakdowns in rotary machinery. Their functionality is directly relevant to the operational performance, service life and efficiency of these machines. Therefore, bearing fault identification is very significant. The accuracy of fault or anomaly detection by the current techniques is not adequate. We propose a data mining-based framework for fault identification and anomaly detection from machine vibration data. In this framework, to capture the useful knowledge from the vibration data stream (VDS), we first pre-process the data using Fast Fourier Transform (FFT) to extract the frequency signature and then build a compact tree called SAFP-tree (sliding window associated frequency pattern tree), and propose a mining algorithm called SAFP. Our SAFP algorithm can mine associated frequency patterns (i.e., fault frequency signatures) in the current window of VDS and use them to identify faults in the bearing data. Finally, SAFP is further enhanced to SAFP-AD for anomaly detection by determining the normal behavior measure (NBM) from the extracted frequency patterns. The results show that our technique is very efficient in identifying faults and detecting anomalies over VDS and can be used for remote machine health diagnosis. © 2016, Springer Science+Business Media New York.
A Decentralized Patient Agent Controlled Blockchain for Remote Patient Monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 15th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2019 Vol. 2019-October, p. 207-214
- Full Text: false
- Reviewed:
- Description: Blockchain emerging for healthcare provides a secure, decentralized and patient driven record management system. However, the storage of data generated from IoT devices in remote patient management applications requires a fast consensus mechanism. In this paper, we propose a lightweight consensus mechanism and a decentralized patient software agent to control a remote patient monitoring (RPM) system. The decentralized RPM architecture includes devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) software replicated on the Smartphone, Fog and Cloud servers processes medical data to ensure reliable, secure and private communication. Performance analysis has been conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled remote patient monitoring system. © 2019 IEEE.
- Description: E1
A framework for a QoS based adaptive topology control system for wireless ad hoc networks with multibeam smart antennas
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2008
- Type: Text , Conference proceedings
- Full Text: false
- Description: Wireless ad hoc networks are self-configurable distributed systems. One of the major problems in traditional wireless ad hoc networks is interference. The interference could be reduced using smart directional antennas. In this study, multibeam smart antennas have been used. When using this type of antenna, two nodes can communicate when both the sending and receiving beams are pointing towards each other. Also, a node can only communicate with a subset of nodes in its neighborhood depending on the number of beams and their beamwidth. Thus, the network topology needs to be dynamic in this case, and by controlling the topology network, performance can be increased. In this paper, we present a framework of a cross layer approach of topology control that interacts with the routing layer and MAC layer and meets the required QoS of different data streams. The approach is fully distributed. When the network is initialized, the algorithm builds an initial connected topology and the routing algorithm uses this topology to find paths for the current communications. Then, depending on the network scenario, current communications and the required QoS, the topology control layer changes the topology to optimize the network performance. This study concerns suburban ad hoc networks (SAHN) where nodes tend to be fixed and are aware of their locations.
A framework for data privacy and security accountability in data breach communications
- Authors: Thomas, Louise , Gondal, Iqbal , Oseni, Taiwo , Firmin, Selena
- Date: 2022
- Type: Text , Journal article
- Relation: Computers and Security Vol. 116, no. (2022), p.
- Full Text: false
- Reviewed:
- Description: Organisations need to take steps to protect the privacy and security of the personal information they hold. However, when data is breached, how do individuals know whether the organisation took reasonable steps to protect their data? When breached organisations notify affected individuals, this communication is likely to be one of the few windows into the incident from the outside and can become an important artefact for research. This desktop study aimed to consider the extent to which publicly available Australian data breach communications reflect data privacy and security best practices. This paper presents a brief review of literature and government guidance on data security and privacy best practices, along with the results of a qualitative content analysis of 33 publicly available Australian data breach communications. This analysis illustrated that there was little reflection of data privacy and security practices. Literature, government guidance and the content analysis were used to inform and develop a new voluntary framework for organisations. This consists of a series of evaluation questions divided into two broad categories: responsible data management and responsible portrayal of the breach. The framework has the potential to help organisations plan the inclusion of data privacy and security management aspects in their data breach communications. This could assist organisations to address their legal and ethical responsibility to account for their actions in managing privacy and security of the personal data they hold. © 2022
A lightweight blockchain based framework for underwater ioT
- Authors: Uddin, Md , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 8, no. 12 (2019), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including underwater monitoring, where sensors are located at various depths, and data must be transmitted to surface base stations for storage and processing. Ensuring that data transmitted across hierarchical sensor networks are kept secure and private without high computational cost remains a challenge. In this paper, we propose a multilevel sensor monitoring architecture. Our proposal includes a layer-based architecture consisting of Fog and Cloud elements to process and store and process the Internet of Underwater Things (IoUT) data securely with customized Blockchain technology. The secure routing of IoUT data through the hierarchical topology ensures the legitimacy of data sources. A security and performance analysis was performed to show that the architecture can collect data from IoUT devices in the monitoring region efficiently and securely. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
A mapreduce based technique for mining behavioral patterns from sensor data
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2015
- Type: Text , Conference paper
- Relation: 22nd International Conference on Neural Information Processing, ICONIP 2015; Istanbul, Turkey; 9th-12th November 2015 Vol. 9492, p. 145-153
- Full Text: false
- Reviewed:
- Description: WSNs generate a large amount of data in the form of streams, and temporal regularity in occurrence behavior is considered as an important measure for assessing the importance of patterns in WSN data. A frequent sensor pattern that occurs after regular intervals in WSNs is called regularly frequent sensor patterns (RFSPs). Existing RFSPs techniques assume that the data structure of the mining task is small enough to fit in the main memory of a processor. However, given the emergence of the Internet of Things (IoT), WSNs in future will generate huge volume of data, which means such an assumption does not hold any longer. To overcome this, a distributed solution using MapReduce model has not yet been explored extensively. Since MapReduce is becoming the de-facto model for computation on large data, an efficient RFSPs mining algorithm on this model is likely to provide a highly effective solution. In this work, we propose a regularly frequent sensor patterns mining algorithm called RFSP-H which uses MapReduce based framework. Extensive performance analyses show that our technique is significantly time efficient in finding regularly frequent sensor patterns. © Springer International Publishing Switzerland 2015.
A new resource distribution model for improved QoS in an integrated WiMAX/WiFi architecture
- Authors: Rabbani, Md , Kamruzzaman, Joarder , Gondal, Iqbal , Ahmad, Iftekhar
- Date: 2011
- Type: Text , Conference paper
- Full Text: false
- Reviewed:
A novel algorithm for mining behavioral patterns from wireless sensor networks
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference paper
- Relation: 2014 International Joint Conference on Neural Networks, IJCNN 2014; Beijing, China; 6th-11th July 2014 p. 1-7
- Full Text: false
- Reviewed:
- Description: Due to recent advances in wireless sensor networks (WSNs) and their ability to generate huge amount of data in the form of streams, knowledge discovery techniques have received a great deal of attention to extract useful knowledge regarding the underlying network. Traditionally sensor association rules measure occurrence frequency of patterns. However, these rules often generate a huge number of rules, most of which are non-informative or fail to reflect the true correlation among data objects. In this paper, we propose a new type of sensor behavioral pattern called associated sensor patterns that captures association-like co-occurrences and the strong temporal correlations implied by such co-occurrences in the sensor data. We also propose a novel tree structure called as associated sensor pattern tree (ASPT) and a mining algorithm, associated sensor pattern (ASP) which facilitates frequent pattern (FP) growth-based technique to generate all associated sensor patterns from WSN data with only one scan over the sensor database. Extensive performance study shows that our algorithm is very efficient in finding associated sensor patterns than the existing significant algorithms.
A novel color image fusion QoS measure for multi-sensor night vision applications
- Authors: Anwaar, Ul-Haq , Gondal, Iqbal , Murshed, Manzur
- Date: 2010
- Type: Text , Conference proceedings
- Full Text: false
- Description: Color image fusion of visible and infra-red imagery can play an important role in multi-sensor night vision systems that are an integral part of modern warfare. Image fusion minimizes the amount of required bandwidth by transmitting the fused image rather than multiple sensor images. Color image fusion can be achieved by combining inputs from original colored sensors or by employing pseudo colorization and color transfer to grayscale images. Various quality measures have been proposed for multi-sensor grayscale image fusion techniques; but no appropriate quality measure has been devised for the quality evaluation of multi-sensor color image fusion. In this paper, we propose a novel color image fusion quality measure, Color Fusion Objective Index (CFOI) based on colorfulness, gradient similarity and mutual information techniques. Experimental results show the effectiveness of CFOI to evaluate the color and salient feature extraction introduced by color fusion techniques into the final fused imagery as well as its consistency with subjective evaluation.
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Authors: Khraisat, Ansam , Gondal, Iqbal , Vamplew, Peter , Kamruzzaman, Joarder , Alazab, Ammar
- Date: 2019
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 8, no. 11 (2019), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack to the end nodes. Due to the large number and diverse types of IoT devices, it is a challenging task to protect the IoT infrastructure using a traditional intrusion detection system. To protect IoT devices, a novel ensemble Hybrid Intrusion Detection System (HIDS) is proposed by combining a C5 classifier and One Class Support Vector Machine classifier. HIDS combines the advantages of Signature Intrusion Detection System (SIDS) and Anomaly-based Intrusion Detection System (AIDS). The aim of this framework is to detect both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the Bot-IoT dataset, which includes legitimate IoT network traffic and several types of attacks. Experiments show that the proposed hybrid IDS provide higher detection rate and lower false positive rate compared to the SIDS and AIDS techniques. © 2019 by the authors. Licensee MDPI, Basel, Switzerland.
A novel vertical handover scheme for diminution in social network traffic
- Authors: Haider, Ammar , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Conference paper
- Full Text:
- Reviewed:
A patient agent to manage blockchains for remote patient monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 7th International Conference on Global Telehealth, GT 2018; Colombo, Sri Lanka; 10th-11th October 2018; published in Studies in Health Technology and Informatics Vol. 254, p. 105-115
- Full Text: false
- Reviewed:
- Description: Continuous monitoring of patient's physiological signs has the potential to augment traditional medical practice, particularly in developing countries that have a shortage of healthcare professionals. However, continuously streamed data presents additional security, storage and retrieval challenges and further inhibits initiatives to integrate data to form electronic health record systems. Blockchain technologies enable data to be stored securely and inexpensively without recourse to a trusted authority. Blockchain technologies also promise to provide architectures for electronic health records that do not require huge government expenditure that challenge developing nations. However, Blockchain deployment, particularly with streamed data challenges existing Blockchain algorithms that take too long to place data in a block, and have no mechanism to determine whether every data point in every stream should be stored in such a secure way. This article presents an architecture that involves a Patient Agent, coordinating the insertion of continuous data streams into Blockchains to form an electronic health record.
- Description: Studies in Health Technology and Informatics
A server side solution for detecting webInject : A machine learning approach
- Authors: Moniruzzaman, Md , Bagirov, Adil , Gondal, Iqbal , Brown, Simon
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2018; Melbourne, Australia; 3rd June 2018; published in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 11154 LNAI, p. 162-167
- Full Text: false
- Reviewed:
- Description: With the advancement of client-side on the fly web content generation techniques, it becomes easier for attackers to modify the content of a website dynamically and gain access to valuable information. A majority portion of online attacks is now done by WebInject. The end users are not always skilled enough to differentiate between injected content and actual contents of a webpage. Some of the existing solutions are designed for client side and all the users have to install it in their system, which is a challenging task. In addition, various platforms and tools are used by individuals, so different solutions needed to be designed. Existing server side solution often focuses on sanitizing and filtering the inputs. It will fail to detect obfuscated and hidden scripts. In this paper, we propose a server side solution using a machine learning approach to detect WebInject in banking websites. Unlike other techniques, our method collects features of a Document Object Model (DOM) and classifies it with the help of a pre-trained model.
A smart priority-based traffic control system for emergency vehicles
- Authors: Karmakar, Gour , Chowdhury, Abdullahi , Kamruzzaman, Joarder , Gondal, Iqbal
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 21, no. 14 (2021), p. 15849-15858
- Full Text: false
- Reviewed:
- Description: Unwanted events on roads, such as incidents and increased traffic jams, can cause human lives and economic loss. For efficient incident management, it is essential to send Emergency Vehicles (EVs) to the incident place as quickly as possible. To reduce incidence clearance time, several approaches exist to provide a clear pathway to EVs mainly fitted with RFID sensors in the urban areas. However, they neither assign priority to the EVs based on the type and severity of an incident nor consider the effect on other on-road traffic. To address this issue, in this paper, we introduce an Emergency Vehicle Priority System (EVPS) by determining the priority level of an EV based on the type and the severity of an incident, and estimating the number of necessary signal interventions while considering the impact of those interventions on the traffic in the roads surrounding the EV's travel path. We present how EVPS determines the priority code and a new algorithm to estimate the number of green signal interventions to attain the quickest incident response while concomitantly reducing impact on others. A simulation model is developed in Simulation of Urban Mobility (SUMO) using the real traffic data of Melbourne, Australia, captured by various sensors. Results show that our system recommends appropriate number of intervention that can reduce emergency response time significantly. © 2001-2012 IEEE.
A technique for parallel share-frequent sensor pattern mining from wireless sensor networks
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference paper
- Relation: 14th Annual International Conference on Computational Science, ICCS 2014; Cairns, Australia; 10th-12th June 2014; published in Procedia Computer Science p. 124-133
- Full Text:
- Reviewed:
- Description: WSNs generate huge amount of data in the form of streams and mining useful knowledge from these streams is a challenging task. Existing works generate sensor association rules using occurrence frequency of patterns with binary frequency (either absent or present) or support of a pattern as a criterion. However, considering the binary frequency or support of a pattern may not be a sufficient indicator for finding meaningful patterns from WSN data because it only reflects the number of epochs in the sensor data which contain that pattern. The share measure of sensorsets could discover useful knowledge about numerical values associated with sensor in a sensor database. Therefore, in this paper, we propose a new type of behavioral pattern called share-frequent sensor patterns by considering the non-binary frequency values of sensors in epochs. To discover share-frequent sensor patterns from sensor dataset, we propose a novel parallel technique. In this technique, we develop a novel tree structure, called parallel share-frequent sensor pattern tree (PShrFSP-tree) that is constructed at each local node independently, by capturing the database contents to generate the candidate patterns using a pattern growth technique with a single scan and then merges the locally generated candidate patterns at the final stage to generate global share-frequent sensor patterns. Comprehensive experimental results show that our proposed model is very efficient for mining share-frequent patterns from WSN data in terms of time and scalability.
A warning based preemptive routing scheme for QoS maintenance in wireless ad hoc networks
- Authors: Rokonuzzaman, S. K. , Pose, Ronald , Gondal, Iqbal
- Date: 2009
- Type: Text , Conference paper
- Relation: PE-WASUN '09 Proceedings of the 6th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
- Full Text: false
- Reviewed:
- Description: Traditional QoS routing protocols find paths that meet the QoS requirements while discovering routes. The chosen route is used while the QoS is met. If the QoS is violated rerouting takes place. Violation of QoS may be unacceptable for delay sensitive traffic. We introduce a preemptive QoS re-routing scheme. The end-to-end delay of packets in each session is monitored and if it seems likely that QoS violation might occur, a preemptive QoS rerouting process is initiated. This helps maintain QoS in dynamic wireless ad hoc networks. Schemes for triggering QoS re-routing are investigated. We have reduced the number of late packets and improved the overall end-to-end delay of the communications.
Abrasion modeling of multiple-point defect dynamics for machine condition monitoring
- Authors: Yaqub, Muhammad , Gondal, Iqbal , Kamruzzaman, Joarder , Loparo, Kenneth
- Date: 2013
- Type: Text , Journal article
- Relation: IEEE Transactions on Reliability Vol. 62, no. 1 (2013), p. 171-182
- Full Text: false
- Reviewed:
- Description: Multiple-point defects and abraded surfaces in rotary machinery induce complex vibration signatures, and have a tendency to mislead defect diagnosis models. A challenging problem in machine defect diagnosis is to model and study defect signature dynamics in the case of multiple-point defects and surface abrasion. In this study, a multiple-point defect model (MPDM) that characterizes the dynamics of n-point bearing defects is proposed. MPDM is further extended to model degradation in a rotating machine as a special case of multiple-point defects. Analytical and experimental results for multiple-point defects and abrasions show that the location of the fundamental defect frequency shifts depending upon the relative location of the defects and width of the abrasive region. This variation in the defect frequency results in a degradation of the defect detection accuracy of the defect diagnostic model. Based on envelope detection analysis, a modification in existing defect diagnostic models is recommended to nullify the impact of multiple-point defects, and general abrasion in machine components.