-
Automatic Speech Recognition for Biomedical Data in Bengali Language
Authors:
Shariar Kabir,
Nazmun Nahar,
Shyamasree Saha,
Mamunur Rashid
Abstract:
This paper presents the development of a prototype Automatic Speech Recognition (ASR) system specifically designed for Bengali biomedical data. Recent advancements in Bengali ASR are encouraging, but a lack of domain-specific data limits the creation of practical healthcare ASR models. This project bridges this gap by develo** an ASR system tailored for Bengali medical terms like symptoms, sever…
▽ More
This paper presents the development of a prototype Automatic Speech Recognition (ASR) system specifically designed for Bengali biomedical data. Recent advancements in Bengali ASR are encouraging, but a lack of domain-specific data limits the creation of practical healthcare ASR models. This project bridges this gap by develo** an ASR system tailored for Bengali medical terms like symptoms, severity levels, and diseases, encompassing two major dialects: Bengali and Sylheti. We train and evaluate two popular ASR frameworks on a comprehensive 46-hour Bengali medical corpus. Our core objective is to create deployable health-domain ASR systems for digital health applications, ultimately increasing accessibility for non-technical users in the healthcare sector.
△ Less
Submitted 16 June, 2024;
originally announced June 2024.
-
Deep learning in computed tomography pulmonary angiography imaging: a dual-pronged approach for pulmonary embolism detection
Authors:
Fabiha Bushra,
Muhammad E. H. Chowdhury,
Rusab Sarmun,
Saidul Kabir,
Menatalla Said,
Sohaib Bassam Zoghoul,
Adam Mushtak,
Israa Al-Hashimi,
Abdulrahman Alqahtani,
Anwarul Hasan
Abstract:
The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effective…
▽ More
The increasing reliance on Computed Tomography Pulmonary Angiography (CTPA) for Pulmonary Embolism (PE) diagnosis presents challenges and a pressing need for improved diagnostic solutions. The primary objective of this study is to leverage deep learning techniques to enhance the Computer Assisted Diagnosis (CAD) of PE. With this aim, we propose a classifier-guided detection approach that effectively leverages the classifier's probabilistic inference to direct the detection predictions, marking a novel contribution in the domain of automated PE diagnosis. Our classification system includes an Attention-Guided Convolutional Neural Network (AG-CNN) that uses local context by employing an attention mechanism. This approach emulates a human expert's attention by looking at both global appearances and local lesion regions before making a decision. The classifier demonstrates robust performance on the FUMPE dataset, achieving an AUROC of 0.927, sensitivity of 0.862, specificity of 0.879, and an F1-score of 0.805 with the Inception-v3 backbone architecture. Moreover, AG-CNN outperforms the baseline DenseNet-121 model, achieving an 8.1% AUROC gain. While previous research has mostly focused on finding PE in the main arteries, our use of cutting-edge object detection models and ensembling techniques greatly improves the accuracy of detecting small embolisms in the peripheral arteries. Finally, our proposed classifier-guided detection approach further refines the detection metrics, contributing new state-of-the-art to the community: mAP$_{50}$, sensitivity, and F1-score of 0.846, 0.901, and 0.779, respectively, outperforming the former benchmark with a significant 3.7% improvement in mAP$_{50}$. Our research aims to elevate PE patient care by integrating AI solutions into clinical workflows, highlighting the potential of human-AI collaboration in medical diagnostics.
△ Less
Submitted 5 January, 2024; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Is Stack Overflow Obsolete? An Empirical Study of the Characteristics of ChatGPT Answers to Stack Overflow Questions
Authors:
Samia Kabir,
David N. Udo-Imeh,
Bonan Kou,
Tianyi Zhang
Abstract:
Q&A platforms have been crucial for the online help-seeking behavior of programmers. However, the recent popularity of ChatGPT is altering this trend. Despite this popularity, no comprehensive study has been conducted to evaluate the characteristics of ChatGPT's answers to programming questions. To bridge the gap, we conducted the first in-depth analysis of ChatGPT answers to 517 programming quest…
▽ More
Q&A platforms have been crucial for the online help-seeking behavior of programmers. However, the recent popularity of ChatGPT is altering this trend. Despite this popularity, no comprehensive study has been conducted to evaluate the characteristics of ChatGPT's answers to programming questions. To bridge the gap, we conducted the first in-depth analysis of ChatGPT answers to 517 programming questions on Stack Overflow and examined the correctness, consistency, comprehensiveness, and conciseness of ChatGPT answers. Furthermore, we conducted a large-scale linguistic analysis, as well as a user study, to understand the characteristics of ChatGPT answers from linguistic and human aspects. Our analysis shows that 52% of ChatGPT answers contain incorrect information and 77% are verbose. Nonetheless, our user study participants still preferred ChatGPT answers 35% of the time due to their comprehensiveness and well-articulated language style. However, they also overlooked the misinformation in the ChatGPT answers 39% of the time. This implies the need to counter misinformation in ChatGPT answers to programming questions and raise awareness of the risks associated with seemingly correct answers.
△ Less
Submitted 7 February, 2024; v1 submitted 4 August, 2023;
originally announced August 2023.
-
Math Word Problem Solving by Generating Linguistic Variants of Problem Statements
Authors:
Syed Rifat Raiyan,
Md. Nafis Faiyaz,
Shah Md. Jawad Kabir,
Mohsinul Kabir,
Hasan Mahmud,
Md Kamrul Hasan
Abstract:
The art of mathematical reasoning stands as a fundamental pillar of intellectual progress and is a central catalyst in cultivating human ingenuity. Researchers have recently published a plethora of works centered around the task of solving Math Word Problems (MWP) $-$ a crucial stride towards general AI. These existing models are susceptible to dependency on shallow heuristics and spurious correla…
▽ More
The art of mathematical reasoning stands as a fundamental pillar of intellectual progress and is a central catalyst in cultivating human ingenuity. Researchers have recently published a plethora of works centered around the task of solving Math Word Problems (MWP) $-$ a crucial stride towards general AI. These existing models are susceptible to dependency on shallow heuristics and spurious correlations to derive the solution expressions. In order to ameliorate this issue, in this paper, we propose a framework for MWP solvers based on the generation of linguistic variants of the problem text. The approach involves solving each of the variant problems and electing the predicted expression with the majority of the votes. We use DeBERTa (Decoding-enhanced BERT with disentangled attention) as the encoder to leverage its rich textual representations and enhanced mask decoder to construct the solution expressions. Furthermore, we introduce a challenging dataset, $\mathrm{P\small{ARA}\normalsize{MAWPS}}$, consisting of paraphrased, adversarial, and inverse variants of selectively sampled MWPs from the benchmark $\mathrm{M\small{AWPS}}$ dataset. We extensively experiment on this dataset along with other benchmark datasets using some baseline MWP solver models. We show that training on linguistic variants of problem statements and voting on candidate predictions improve the mathematical reasoning and robustness of the model. We make our code and data publicly available.
△ Less
Submitted 24 June, 2023;
originally announced June 2023.
-
Online Dynamic Reliability Evaluation of Wind Turbines based on Drone-assisted Monitoring
Authors:
Sohag Kabir,
Koorosh Aslansefat,
Prosanta Gope,
Felician Campean,
Yiannis Papadopoulos
Abstract:
The offshore wind energy is increasingly becoming an attractive source of energy due to having lower environmental impact. Effective operation and maintenance that ensures the maximum availability of the energy generation process using offshore facilities and minimal production cost are two key factors to improve the competitiveness of this energy source over other traditional sources of energy. C…
▽ More
The offshore wind energy is increasingly becoming an attractive source of energy due to having lower environmental impact. Effective operation and maintenance that ensures the maximum availability of the energy generation process using offshore facilities and minimal production cost are two key factors to improve the competitiveness of this energy source over other traditional sources of energy. Condition monitoring systems are widely used for health management of offshore wind farms to have improved operation and maintenance. Reliability of the wind farms are increasingly being evaluated to aid in the maintenance process and thereby to improve the availability of the farms. However, much of the reliability analysis is performed offline based on statistical data. In this article, we propose a drone-assisted monitoring based method for online reliability evaluation of wind turbines. A blade system of a wind turbine is used as an illustrative example to demonstrate the proposed approach.
△ Less
Submitted 23 November, 2022;
originally announced November 2022.
-
All-electrical spin-to-charge conversion in sputtered Bi$_x$Se$_{1-x}$
Authors:
Won Young Choi,
Isabel C. Arango,
Van Tuong Pham,
Diogo C. Vaz,
Haozhe Yang,
Inge Groen,
Chia-Ching Lin,
Emily S. Kabir,
Kaan Oguz,
Punyashloka Debashis,
John J. Plombon,
Hai Li,
Dmitri E. Nikonov,
Andrey Chuvilin,
Luis E. Hueso,
Ian A. Young,
Fèlix Casanova
Abstract:
One of the major obstacles to realizing spintronic devices such as MESO logic devices is the small signal magnitude used for magnetization readout, making it important to find materials with high spin-to-charge conversion efficiency. Although intermixing at the junction of two materials is a widely occurring phenomenon, its influence on material characterization and the estimation of spin-to-charg…
▽ More
One of the major obstacles to realizing spintronic devices such as MESO logic devices is the small signal magnitude used for magnetization readout, making it important to find materials with high spin-to-charge conversion efficiency. Although intermixing at the junction of two materials is a widely occurring phenomenon, its influence on material characterization and the estimation of spin-to-charge conversion efficiencies is easily neglected or underestimated. Here, we demonstrate all electrical spin-to-charge conversion in Bi$_x$Se$_{1-x}$ nanodevices and show how the conversion efficiency can be overestimated by tens of times depending on the adjacent metal used as a contact. We attribute this to the intermixing-induced compositional change and the properties of a polycrystal that lead to drastic changes in resistivity and spin Hall angle. Strategies to improve the spin-to-charge conversion signal in similar structures for functional devices are discussed.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
A Disability Lens towards Biases in GPT-3 Generated Open-Ended Languages
Authors:
Akhter Al Amin,
Kazi Sinthia Kabir
Abstract:
Language models (LM) are becoming prevalent in many language-based application spaces globally. Although these LMs are improving our day-to-day interactions with digital products, concerns remain whether open-ended languages or text generated from these models reveal any biases toward a specific group of people, thereby risking the usability of a certain product. There is a need to identify whethe…
▽ More
Language models (LM) are becoming prevalent in many language-based application spaces globally. Although these LMs are improving our day-to-day interactions with digital products, concerns remain whether open-ended languages or text generated from these models reveal any biases toward a specific group of people, thereby risking the usability of a certain product. There is a need to identify whether these models possess bias to improve the fairness in these models. This gap motivates our ongoing work, where we measured the two aspects of bias in GPT-3 generated text through a disability lens.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
An End-to-End Authentication Mechanism for Wireless Body Area Networks
Authors:
Mosarrat Jahan,
Fatema Tuz Zohra,
Md. Kamal Parvez,
Upama Kabir,
Abdul Mohaimen Al Radi,
Shaily Kabir
Abstract:
Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the i…
▽ More
Wireless Body Area Network (WBAN) ensures high-quality healthcare services by endowing distant and continual monitoring of patients' health conditions. The security and privacy of the sensitive health-related data transmitted through the WBAN should be preserved to maximize its benefits. In this regard, user authentication is one of the primary mechanisms to protect health data that verifies the identities of entities involved in the communication process. Since WBAN carries crucial health data, every entity engaged in the data transfer process must be authenticated. In literature, an end-to-end user authentication mechanism covering each communicating party is absent. Besides, most of the existing user authentication mechanisms are designed assuming that the patient's mobile phone is trusted. In reality, a patient's mobile phone can be stolen or comprised by malware and thus behaves maliciously. Our work addresses these drawbacks and proposes an end-to-end user authentication and session key agreement scheme between sensor nodes and medical experts in a scenario where the patient's mobile phone is semi-trusted. We present a formal security analysis using BAN logic. Besides, we also provide an informal security analysis of the proposed scheme. Both studies indicate that our method is robust against well-known security attacks. In addition, our scheme achieves comparable computation and communication costs concerning the related existing works. The simulation shows that our method preserves satisfactory network performance.
△ Less
Submitted 11 November, 2021;
originally announced November 2021.
-
Towards Handling Uncertainty-at-Source in AI -- A Review and Next Steps for Interval Regression
Authors:
Shaily Kabir,
Christian Wagner,
Zack Ellerby
Abstract:
Most of statistics and AI draw insights through modelling discord or variance between sources of information (i.e., inter-source uncertainty). Increasingly, however, research is focusing upon uncertainty arising at the level of individual measurements (i.e., within- or intra-source), such as for a given sensor output or human response. Here, adopting intervals rather than numbers as the fundamenta…
▽ More
Most of statistics and AI draw insights through modelling discord or variance between sources of information (i.e., inter-source uncertainty). Increasingly, however, research is focusing upon uncertainty arising at the level of individual measurements (i.e., within- or intra-source), such as for a given sensor output or human response. Here, adopting intervals rather than numbers as the fundamental data-type provides an efficient, powerful, yet challenging way forward -- offering systematic capture of uncertainty-at-source, increasing informational capacity, and ultimately potential for insight. Following recent progress in the capture of interval-valued data, including from human participants, conducting machine learning directly upon intervals is a crucial next step. This paper focuses on linear regression for interval-valued data as a recent growth area, providing an essential foundation for broader use of intervals in AI. We conduct an in-depth analysis of state-of-the-art methods, elucidating their behaviour, advantages, and pitfalls when applied to datasets with different properties. Specific emphasis is given to the challenge of preserving mathematical coherence -- i.e., ensuring that models maintain fundamental mathematical properties of intervals throughout -- and the paper puts forward extensions to an existing approach to guarantee this. Carefully designed experiments, using both synthetic and real-world data, are conducted -- with findings presented alongside novel visualizations for interval-valued regression outputs, designed to maximise model interpretability. Finally, the paper makes recommendations concerning method suitability for data sets with specific properties and highlights remaining challenges and important next steps for develo** AI with the capacity to handle uncertainty-at-source.
△ Less
Submitted 27 February, 2023; v1 submitted 15 April, 2021;
originally announced April 2021.
-
Weighted Contourlet Parametric (WCP) Feature Based Breast Tumor Classification from B-Mode Ultrasound Image
Authors:
Shahriar Mahmud Kabir,
Md. Sayed Tanveer,
ASM Shihavuddin,
Mohammed Imamul Hassan Bhuiyan
Abstract:
Automated detection of breast tumor in early stages using B-Mode Ultrasound image is crucial for preventing widespread breast cancer specially among women. This paper is primarily focusing on the classification of breast tumors through statistical modelling such as Rician inverse Gaussian (RiIG) pdf of contourlet transformed B-Mode image of breast tumors which is not reported yet in other earlier…
▽ More
Automated detection of breast tumor in early stages using B-Mode Ultrasound image is crucial for preventing widespread breast cancer specially among women. This paper is primarily focusing on the classification of breast tumors through statistical modelling such as Rician inverse Gaussian (RiIG) pdf of contourlet transformed B-Mode image of breast tumors which is not reported yet in other earlier works. The suitability of RiIG distribution in modeling the contourlet coefficients is illustrated and compared with that of Nakagami distribution. The proposed method consists of pre-processing to remove the speckle noise, segmentation of the lesion region, contourlet transform on the B-Mode Ultrasound image and using the corresponding contourlet sub-band coefficients and the RiIG parameters, production of contourlet parametric (CP) images and weighted contourlet parametric (WCP) images. A number of geometrical, statistical, and texture features are calculated from B-Mode and the contourlet parametric images. In order to classify the features, seven different classifiers are employed. The proposed approach is applied to two different datasets (Mendeley Data and Dataset B) those are available publicly. It is shown that with parametric images, accuracies in the range of 94-97% are achieved for different classifiers. Specifically, with the support vector machine and k-nearest-neighbor classifier, very high accuracies of 97.2% and 97.55% can be obtained for the Mendeley Data and Dataset B,respectively, using the weighted contourlet parametric images.The reported classification performance is also compared with that of other works using the datasets employed in this paper. It is seen that the proposed approach using weighted contourlet parametric images can provide a superior performance.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
A deep convolutional neural network model for rapid prediction of fluvial flood inundation
Authors:
Syed Kabir,
Sandhya Patidar,
Xilin Xia,
Qiuhua Liang,
Jeffrey Neal,
Gareth Pender,
.
Abstract:
Most of the two-dimensional (2D) hydraulic/hydrodynamic models are still computationally too demanding for real-time applications. In this paper, an innovative modelling approach based on a deep convolutional neural network (CNN) method is presented for rapid prediction of fluvial flood inundation. The CNN model is trained using outputs from a 2D hydraulic model (i.e. LISFLOOD-FP) to predict water…
▽ More
Most of the two-dimensional (2D) hydraulic/hydrodynamic models are still computationally too demanding for real-time applications. In this paper, an innovative modelling approach based on a deep convolutional neural network (CNN) method is presented for rapid prediction of fluvial flood inundation. The CNN model is trained using outputs from a 2D hydraulic model (i.e. LISFLOOD-FP) to predict water depths. The pre-trained model is then applied to simulate the January 2005 and December 2015 floods in Carlisle, UK. The CNN predictions are compared favourably with the outputs produced by LISFLOOD-FP. The performance of the CNN model is further confirmed by benchmarking against a support vector regression (SVR) method. The results show that the CNN model outperforms SVR by a large margin. The CNN model is highly accurate in capturing flooded cells as indicated by several quantitative assessment matrices. The estimated error for reproducing maximum flood depth is 0 ~ 0.2 meters for the 2005 event and 0 ~ 0.5 meters for the 2015 event at over 99% of the cells covering the computational domain. The proposed CNN method offers great potential for real-time flood modelling/forecasting considering its simplicity, superior performance and computational efficiency.
△ Less
Submitted 16 September, 2020; v1 submitted 20 June, 2020;
originally announced June 2020.
-
Oxygen Reduction Reaction and X-ray Photoelectron Spectroscopy of Sputtered Fe-N-C Films
Authors:
Yun Xu,
Michael J. Dzara,
Sadia Kabir,
Svitlana Pylypenko,
Kenneth Neyerlin,
Andriy Zakutayev
Abstract:
Electrocatalysts for the oxygen reduction reaction (ORR) based on complexes of iron and nitrogen in a carbon matrix (Fe-N-C) are a promising alternative to platinum group metal (PGM) based catalysts in polymer electrolyte membrane (PEM) fuel cells. Further improvements of Fe-N-C catalysts would benefit from model thin film studies of activity and stability of catalytic sites, but synthesis of Fe-N…
▽ More
Electrocatalysts for the oxygen reduction reaction (ORR) based on complexes of iron and nitrogen in a carbon matrix (Fe-N-C) are a promising alternative to platinum group metal (PGM) based catalysts in polymer electrolyte membrane (PEM) fuel cells. Further improvements of Fe-N-C catalysts would benefit from model thin film studies of activity and stability of catalytic sites, but synthesis of Fe-N-C model thin films is challenging. Here we report on synthesis and characterization of Fe-N-C thin films produced by co-sputtering iron and carbon in a reactive nitrogen atmosphere onto removable glassy carbon rotating disk electrode (RDE) tips. Scanning electron microscopy (SEM) measurements indicate that the Fe-N-C films deposited at high temperature are smoother than the films annealed at high temperature. ORR activity measured on the thin Fe-N-C films is greater for both high-temperature samples than for the room-temperature sample. From the analysis of X-ray photoelectron spectroscopy (XPS) data, exposure of the films to high temperatures results in increased graphitization of the carbon with the Fe-N-C films, and increased relative amount of graphitic and hydrogenated nitrogen species. Overall the results of this study demonstrate the feasibility of a thin film model system approach for studying active sites in PGM-free catalysts.
△ Less
Submitted 8 November, 2019;
originally announced November 2019.
-
Don't Fear the Bit Flips: Optimized Coding Strategies for Binary Classification
Authors:
Frederic Sala,
Shahroze Kabir,
Guy Van den Broeck,
Lara Dolecek
Abstract:
After being trained, classifiers must often operate on data that has been corrupted by noise. In this paper, we consider the impact of such noise on the features of binary classifiers. Inspired by tools for classifier robustness, we introduce the same classification probability (SCP) to measure the resulting distortion on the classifier outputs. We introduce a low-complexity estimate of the SCP ba…
▽ More
After being trained, classifiers must often operate on data that has been corrupted by noise. In this paper, we consider the impact of such noise on the features of binary classifiers. Inspired by tools for classifier robustness, we introduce the same classification probability (SCP) to measure the resulting distortion on the classifier outputs. We introduce a low-complexity estimate of the SCP based on quantization and polynomial multiplication. We also study channel coding techniques based on replication error-correcting codes. In contrast to the traditional channel coding approach, where error-correction is meant to preserve the data and is agnostic to the application, our schemes specifically aim to maximize the SCP (equivalently minimizing the distortion of the classifier output) for the same redundancy overhead.
△ Less
Submitted 7 March, 2017;
originally announced March 2017.
-
Policy based intrusion detection and response system in hierarchical WSN architecture
Authors:
Mohammad Saiful Islam Mamun,
A. F. M Sultanul Kabir,
Md. Sakhawat Hossen,
Md. Razib Hayat Khan
Abstract:
In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose…
▽ More
In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose a policy based IDS for hierarchical architecture that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed IDS architecture we followed clustering mechanism to build four level hierarchical network which enhance network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection that concentrates on power saving of sensor nodes by distributing the responsibility of intrusion detection among different layers. We also introduce a policy based intrusion response system for hierarchical architecture.
△ Less
Submitted 7 September, 2012;
originally announced September 2012.
-
Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information
Authors:
A. F. M. Sultanul Kabir,
Mohammad Saiful Islam Mamun
Abstract:
A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex…
▽ More
A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex interactions with the system. As the users have no prior knowledge of the sensor data or services our aim is to develop a visual query interface where users can feed more user friendly queries and machine can understand those. In this paper work, we have developed an Interactive visual query interface for the users. To accomplish this we have considered several use cases and we have derived graphical representation of query from their text based format for those use case scenario. We have facilitated the user by extracting class, subclass and properties from Ontology. To do so we have parsed OWL file in the user interface and based upon the parsed information users build visual query. Later on we have translated the visual query languages into SPARQL query, a machine understandable format which helps the machine to communicate with the underlying technology.
△ Less
Submitted 18 August, 2012;
originally announced August 2012.
-
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
Authors:
Mohammad Saiful Islam Mamun,
A. F. M. Sultanul Kabir
Abstract:
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion preven…
▽ More
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
△ Less
Submitted 18 August, 2012;
originally announced August 2012.
-
WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure
Authors:
A. F. M Sultanul Kabir,
Md. Razib Hayat Khan,
Abul Ahsan Md. Mahmudul Haque,
Mohammad Saiful Islam Mamun
Abstract:
This paper presents a description of the existing wireless technology Wi-Fi and WiMAX, and try to compare Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16), with respect to which technology provides a better solution to build a wireless access infrastructure. Each technology is evaluated based on some key characteristics. This paper concludes with a statement of, which technology will be the best and mo…
▽ More
This paper presents a description of the existing wireless technology Wi-Fi and WiMAX, and try to compare Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16), with respect to which technology provides a better solution to build a wireless access infrastructure. Each technology is evaluated based on some key characteristics. This paper concludes with a statement of, which technology will be the best and most cost effective solution to end user.
△ Less
Submitted 18 August, 2012;
originally announced August 2012.
-
Nonlinear System Identification and Behavioral Modeling
Authors:
Kazi Mohammed Saidul Huq,
Md. Taslim Arefin,
A. F. M. Sultanul Kabir
Abstract:
This paper has been withdrawn by the author
This paper has been withdrawn by the author
△ Less
Submitted 19 April, 2010; v1 submitted 25 February, 2010;
originally announced February 2010.
-
Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches
Authors:
Md. Sakhawat Hossen,
A. F. M. Sultanul Kabir,
Razib Hayat Khan,
Abdullah Azfar
Abstract:
The increasing role of home automation in routine life and the rising demand for sensor networks enhanced wireless personal area networks (WPANs) development, pervasiveness of wireless & wired network, and research. Soon arose the need of implementing the Internet Protocol in these devices in order to WPAN standards, raising the way for questions on how to provide seamless communication between…
▽ More
The increasing role of home automation in routine life and the rising demand for sensor networks enhanced wireless personal area networks (WPANs) development, pervasiveness of wireless & wired network, and research. Soon arose the need of implementing the Internet Protocol in these devices in order to WPAN standards, raising the way for questions on how to provide seamless communication between wired and wireless technologies. After a quick overview of the Low-rate WPAN standard (IEEE 802.15.4) and the Zigbee stack, this paper focuses on understanding the implications when interconnecting low powered IEEE 802.15.4 devices and a wired IPv6 domain. Subsequently the focus will be on existing approaches to connect LoWPAN devices to the internet and on how these approaches try to solve these challenges, concluding with a critical analysis of interoperability problems.
△ Less
Submitted 5 February, 2010;
originally announced February 2010.