-
DANet: Enhancing Small Object Detection through an Efficient Deformable Attention Network
Authors:
Md Sohag Mia,
Abdullah Al Bary Voban,
Abu Bakor Hayat Arnob,
Abdu Naim,
Md Kawsar Ahmed,
Md Shariful Islam
Abstract:
Efficient and accurate detection of small objects in manufacturing settings, such as defects and cracks, is crucial for ensuring product quality and safety. To address this issue, we proposed a comprehensive strategy by synergizing Faster R-CNN with cutting-edge methods. By combining Faster R-CNN with Feature Pyramid Network, we enable the model to efficiently handle multi-scale features intrinsic…
▽ More
Efficient and accurate detection of small objects in manufacturing settings, such as defects and cracks, is crucial for ensuring product quality and safety. To address this issue, we proposed a comprehensive strategy by synergizing Faster R-CNN with cutting-edge methods. By combining Faster R-CNN with Feature Pyramid Network, we enable the model to efficiently handle multi-scale features intrinsic to manufacturing environments. Additionally, Deformable Net is used that contorts and conforms to the geometric variations of defects, bringing precision in detecting even the minuscule and complex features. Then, we incorporated an attention mechanism called Convolutional Block Attention Module in each block of our base ResNet50 network to selectively emphasize informative features and suppress less useful ones. After that we incorporated RoI Align, replacing RoI Pooling for finer region-of-interest alignment and finally the integration of Focal Loss effectively handles class imbalance, crucial for rare defect occurrences. The rigorous evaluation of our model on both the NEU-DET and Pascal VOC datasets underscores its robust performance and generalization capabilities. On the NEU-DET dataset, our model exhibited a profound understanding of steel defects, achieving state-of-the-art accuracy in identifying various defects. Simultaneously, when evaluated on the Pascal VOC dataset, our model showcases its ability to detect objects across a wide spectrum of categories within complex and small scenes.
△ Less
Submitted 13 October, 2023; v1 submitted 9 October, 2023;
originally announced October 2023.
-
Converting OpenStreetMap Data to Road Networks for Downstream Applications
Authors:
Md Kaisar Ahmed
Abstract:
We study how to convert OpenStreetMap data to road networks for downstream applications. OpenStreetMap data has different formats. Extensible Markup Language (XML) is one of them. OSM data consist of nodes, ways, and relations. We process OSM XML data to extract the information of nodes and ways to obtain the map of streets of the Memphis area. We can use this map for different downstream applicat…
▽ More
We study how to convert OpenStreetMap data to road networks for downstream applications. OpenStreetMap data has different formats. Extensible Markup Language (XML) is one of them. OSM data consist of nodes, ways, and relations. We process OSM XML data to extract the information of nodes and ways to obtain the map of streets of the Memphis area. We can use this map for different downstream applications.
△ Less
Submitted 13 December, 2022; v1 submitted 22 November, 2022;
originally announced November 2022.
-
ThoraX-PriorNet: A Novel Attention-Based Architecture Using Anatomical Prior Probability Maps for Thoracic Disease Classification
Authors:
Md. Iqbal Hossain,
Mohammad Zunaed,
Md. Kawsar Ahmed,
S. M. Jawwad Hossain,
Anwarul Hasan,
Taufiq Hasan
Abstract:
Objective: Computer-aided disease diagnosis and prognosis based on medical images is a rapidly emerging field. Many Convolutional Neural Network (CNN) architectures have been developed by researchers for disease classification and localization from chest X-ray images. It is known that different thoracic disease lesions are more likely to occur in specific anatomical regions compared to others. Thi…
▽ More
Objective: Computer-aided disease diagnosis and prognosis based on medical images is a rapidly emerging field. Many Convolutional Neural Network (CNN) architectures have been developed by researchers for disease classification and localization from chest X-ray images. It is known that different thoracic disease lesions are more likely to occur in specific anatomical regions compared to others. This article aims to incorporate this disease and region-dependent prior probability distribution within a deep learning framework. Methods: We present the ThoraX-PriorNet, a novel attention-based CNN model for thoracic disease classification. We first estimate a disease-dependent spatial probability, i.e., an anatomical prior, that indicates the probability of occurrence of a disease in a specific region in a chest X-ray image. Next, we develop a novel attention-based classification model that combines information from the estimated anatomical prior and automatically extracted chest region of interest (ROI) masks to provide attention to the feature maps generated from a deep convolution network. Unlike previous works that utilize various self-attention mechanisms, the proposed method leverages the extracted chest ROI masks along with the probabilistic anatomical prior information, which selects the region of interest for different diseases to provide attention. Results: The proposed method shows superior performance in disease classification on the NIH ChestX-ray14 dataset compared to existing state-of-the-art methods while reaching an area under the ROC curve (%AUC) of 84.67. Regarding disease localization, the anatomy prior attention method shows competitive performance compared to state-of-the-art methods, achieving an accuracy of 0.80, 0.63, 0.49, 0.33, 0.28, 0.21, and 0.04 with an Intersection over Union (IoU) threshold of 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, and 0.7, respectively.
△ Less
Submitted 21 December, 2023; v1 submitted 6 October, 2022;
originally announced October 2022.
-
TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s
Authors:
Muhammed Kawser Ahmed,
Sujan Kumar Saha,
Christophe Bobda
Abstract:
Secure and trustworthy execution in heterogeneous SoCs is a major priority in the modern computing system. Security of SoCs mainly addresses two broad layers of trust issues: 1. Protection against hardware security threats(Side-channel, IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection against malicious software attacks running on SoC processors. To resist malicious s…
▽ More
Secure and trustworthy execution in heterogeneous SoCs is a major priority in the modern computing system. Security of SoCs mainly addresses two broad layers of trust issues: 1. Protection against hardware security threats(Side-channel, IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection against malicious software attacks running on SoC processors. To resist malicious software-level attackers from gaining unauthorized access and compromising security, we propose a root of trust-based trusted execution mechanism \textbf{\textit{(named as \textbf{TrustToken}) }}. TrustToken builds a security block to provide a root of trust-based IP security: secure key generation and truly random source.
\textbf{TrustToken} only allows trusted communication between the non-trusted third-party IP and the rest of the SoC world by providing essential security features, i.e., secure, isolated execution, and trusted user interaction. The proposed design achieves this by interconnecting the third-party IP interface to \textbf{TrustToken} Controller and checking IP authorization(Token) signals \texttt{`correctness'} at run-time. \textbf{TrustToken} architecture shows a very low overhead resource utilization LUT (618, 1.16 \%), FF (44, 0.04 \%), and BUFG (2 , 6.25\%) in implementation. The experiment results show that TrustToken can provide a secure, low-cost, and trusted solution for non-trusted SoC IPs.
△ Less
Submitted 26 September, 2022;
originally announced September 2022.
-
Trusted IP solution in multi-tenant cloud FPGA platform
Authors:
Muhammed Kawser Ahmed,
Sujan Kumar Saha,
Christophe Bobda
Abstract:
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per watt and flexibility, they are being used more and more in cloud and data center applications. There are growing worries about the security risks posed by multi-tenant sharing as the demand for hardware acceleration increases and gradually gives way to FPGA multi-tenancy in the cloud. The confident…
▽ More
Because FPGAs outperform traditional processing cores like CPUs and GPUs in terms of performance per watt and flexibility, they are being used more and more in cloud and data center applications. There are growing worries about the security risks posed by multi-tenant sharing as the demand for hardware acceleration increases and gradually gives way to FPGA multi-tenancy in the cloud. The confidentiality, integrity, and availability of FPGA-accelerated applications may be compromised if space-shared FPGAs are made available to many cloud tenants. We propose a root of trust-based trusted execution mechanism called \textbf{TrustToken} to prevent harmful software-level attackers from getting unauthorized access and jeopardizing security. With safe key creation and truly random sources, \textbf{TrustToken} creates a security block that serves as the foundation of trust-based IP security. By offering crucial security characteristics, such as secure, isolated execution and trusted user interaction, \textbf{TrustToken} only permits trustworthy connection between the non-trusted third-party IP and the rest of the SoC environment. The suggested approach does this by connecting the third-party IP interface to the \textbf{TrustToken} Controller and running run-time checks on the correctness of the IP authorization(Token) signals. With an emphasis on software-based assaults targeting unauthorized access and information leakage, we offer a noble hardware/software architecture for trusted execution in FPGA-accelerated clouds and data centers.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
Multi-Tenant Cloud FPGA: A Survey on Security
Authors:
Muhammed Kawser Ahmed,
Joel Mandebi,
Sujan Kumar Saha,
Christophe Bobda
Abstract:
With the exponentially increasing demand for performance and scalability in cloud applications and systems, data center architectures evolved to integrate heterogeneous computing fabrics that leverage CPUs, GPUs, and FPGAs. FPGAs differ from traditional processing platforms such as CPUs and GPUs in that they are reconfigurable at run-time, providing increased and customized performance, flexibilit…
▽ More
With the exponentially increasing demand for performance and scalability in cloud applications and systems, data center architectures evolved to integrate heterogeneous computing fabrics that leverage CPUs, GPUs, and FPGAs. FPGAs differ from traditional processing platforms such as CPUs and GPUs in that they are reconfigurable at run-time, providing increased and customized performance, flexibility, and acceleration. FPGAs can perform large-scale search optimization, acceleration, and signal processing tasks compared with power, latency, and processing speed. Many public cloud provider giants, including Amazon, Huawei, Microsoft, Alibaba, etc., have already started integrating FPGA-based cloud acceleration services. While FPGAs in cloud applications enable customized acceleration with low power consumption, it also incurs new security challenges that still need to be reviewed. Allowing cloud users to reconfigure the hardware design after deployment could open the backdoors for malicious attackers, potentially putting the cloud platform at risk. Considering security risks, public cloud providers still don't offer multi-tenant FPGA services. This paper analyzes the security concerns of multi-tenant cloud FPGAs, gives a thorough description of the security problems associated with them, and discusses upcoming future challenges in this field of study.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
OxyJet: Design and Evaluation of A Low-Cost Precision Venturi Based Continuous Positive Airway Pressure (CPAP) System
Authors:
Md. Kawsar Ahmed,
Meemnur Rashid,
Kaisar Ahmed Alman,
Farhan Muhib,
Saeedur Rahman,
Taufiq Hasan
Abstract:
The Covid-19 pandemic has strained the hospital systems in many countries in the world, especially in develo** countries. In many low-resource hospitals, severely ill hypoxemic Covid-19 patients are treated with various forms of low-flow oxygen therapy (0-15 L/min), including interfaces such as a nasal cannula, Hudson mask, venturi-mask, and non-rebreather masks. When 15L/min of pure oxygen flow…
▽ More
The Covid-19 pandemic has strained the hospital systems in many countries in the world, especially in develo** countries. In many low-resource hospitals, severely ill hypoxemic Covid-19 patients are treated with various forms of low-flow oxygen therapy (0-15 L/min), including interfaces such as a nasal cannula, Hudson mask, venturi-mask, and non-rebreather masks. When 15L/min of pure oxygen flow is not sufficient for the patient, treatment guidelines suggest non-invasive positive pressure ventilation (NIPPV) or high-flow nasal oxygenation (HFNO) as the next stage of treatment. However, administering HFNO in the general wards of a low-resource hospital is difficult due to several factors, including difficulty in operation, unavailability of electric power outlets, and frequent maintenance. Therefore, in many cases, the highest level of care a patient receives in the general ward is 15L/min of oxygen on a Non-Rebreather Mask. With a shortage of Intensive Care Unit (ICU) beds, this is a major problem since intermediate forms of treatments are simply not available at an affordable cost. To address this gap, we have developed a low-cost CPAP system specifically designed for low-resource hospitals. The device is a precision venturi-based flow-generator capable of providing up to 60L/min of flow. The device utilizes the mechanics of a jet pump driven by high-pressure oxygen to increase the volumetric flow rate by entraining atmospheric air. The fraction of inspired oxygen (FiO2) can be attained between 40 - 100% using a dual-flowmeter. Consisting of a traditional 22mm breathing circuit, a non-vented CPAP mask, and a Positive End-Expiratory Pressure (PEEP) valve, the CPAP can provide positive pressures between 5-20 cm H2O. The device is manufactured using local 3D printing and workshop facilities.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
X-Ray Spectral Study of AGN Sources Content in Some Deep Extragalactic XMM-Newton Fields
Authors:
M. A. Hassan,
B. A. Korany,
R. Misra,
I. A. M. Issa,
M. K. Ahmed,
F. A. Abdel-Salam
Abstract:
We undertake a spectral study of a sample of bright X-ray sources taken from six XMM-Newton fields at high galactic latitudes, where AGN are the most populous class. These six fields were chosen such that the observation had an exposure time more than 60 ksec, had data from the EPIC-pn detector in the full-Frame mode and lying at high galactic latitude $|b| > 25^o$ . The analysis started by fittin…
▽ More
We undertake a spectral study of a sample of bright X-ray sources taken from six XMM-Newton fields at high galactic latitudes, where AGN are the most populous class. These six fields were chosen such that the observation had an exposure time more than 60 ksec, had data from the EPIC-pn detector in the full-Frame mode and lying at high galactic latitude $|b| > 25^o$ . The analysis started by fitting the spectra of all sources with an absorbed power-law model, and then we fitted all the spectra with an absorbed power-law with a low energy black-body component model.The sources for which we added a black body gave an F-test probability of 0.01 or less (i.e. at 99% confidence level), were recognized as sources that display soft excess. We perform a comparative analysis of soft excess spectral parameters with respect to the underlying power-law one for sources that satisfy this criterion. Those sources, that do not show evidence for a soft excess, based on the F-test probability at a 99% confidence level, were also fitted with the absorbed power-law with a low energy black-body component model with the black-body temperature fixed at 0.1 and 0.2 keV. We establish upper limits on the soft excess flux for those sources at these two temperatures. Finally we have made use of Aladdin interactive sky atlas and matching with NASA/IPAC Extragalactic Database (NED) to identify the X-ray sources in our sample. For those sources which are identified in the NED catalogue, we make a comparative study of the soft excess phenomenon for different types of systems.
△ Less
Submitted 12 September, 2011;
originally announced September 2011.