-
Radious: Unveiling the Enigma of Dental Radiology with BEIT Adaptor and Mask2Former in Semantic Segmentation
Authors:
Mohammad Mashayekhi,
Sara Ahmadi Majd,
Arian Amiramjadi,
Babak Mashayekhi
Abstract:
X-ray images are the first steps for diagnosing and further treating dental problems. So, early diagnosis prevents the development and increase of oral and dental diseases. In this paper, we developed a semantic segmentation algorithm based on BEIT adaptor and Mask2Former to detect and identify teeth, roots, and multiple dental diseases and abnormalities such as pulp chamber, restoration, endodont…
▽ More
X-ray images are the first steps for diagnosing and further treating dental problems. So, early diagnosis prevents the development and increase of oral and dental diseases. In this paper, we developed a semantic segmentation algorithm based on BEIT adaptor and Mask2Former to detect and identify teeth, roots, and multiple dental diseases and abnormalities such as pulp chamber, restoration, endodontics, crown, decay, pin, composite, bridge, pulpitis, orthodontics, radicular cyst, periapical cyst, cyst, implant, and bone graft material in panoramic, periapical, and bitewing X-ray images. We compared the result of our algorithm to two state-of-the-art algorithms in image segmentation named: Deeplabv3 and Segformer on our own data set. We discovered that Radious outperformed those algorithms by increasing the mIoU scores by 9% and 33% in Deeplabv3+ and Segformer, respectively.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Authors:
Zakaria El Mrabet,
Mehdi Ezzari,
Hassan Elghazi,
Badr Abou El Majd
Abstract:
Smart grid is an alternative solution of the conventional power grid which harnesses the power of the information technology to save the energy and meet today's environment requirements. Due to the inherent vulnerabilities in the information technology, the smart grid is exposed to a wide variety of threats that could be translated into cyber-attacks. In this paper, we develop a deep learning-base…
▽ More
Smart grid is an alternative solution of the conventional power grid which harnesses the power of the information technology to save the energy and meet today's environment requirements. Due to the inherent vulnerabilities in the information technology, the smart grid is exposed to a wide variety of threats that could be translated into cyber-attacks. In this paper, we develop a deep learning-based intrusion detection system to defend against cyber-attacks in the advanced metering infrastructure network. The proposed machine learning approach is trained and tested extensively on an empirical industrial dataset which is composed of several attack categories including the scanning, buffer overflow, and denial of service attacks. Then, an experimental comparison in terms of detection accuracy is conducted to evaluate the performance of the proposed approach with Naive Bayes, Support Vector Machine, and Random Forest. The obtained results suggest that the proposed approaches produce optimal results comparing to the other algorithms. Finally, we propose a network architecture to deploy the proposed anomaly-based intrusion detection system across the Advanced Metering Infrastructure network. In addition, we propose a network security architecture composed of two types of Intrusion detection system types, Host and Network-based, deployed across the Advanced Metering Infrastructure network to inspect the traffic and detect the malicious one at all the levels.
△ Less
Submitted 31 December, 2019;
originally announced January 2020.
-
Online Path Generation and Navigation for Swarms of UAVs
Authors:
Adnan Ashraf,
Amin Majd,
Elena Troubitsyna
Abstract:
With the growing popularity of Unmanned Aerial Vehicles (UAVs) for consumer applications, the number of accidents involving UAVs is also increasing rapidly. Therefore, motion safety of UAVs has become a prime concern for UAV operators. For a swarm of UAVs, a safe operation can not be guaranteed without preventing the UAVs from colliding with one another and with static and dynamically appearing, m…
▽ More
With the growing popularity of Unmanned Aerial Vehicles (UAVs) for consumer applications, the number of accidents involving UAVs is also increasing rapidly. Therefore, motion safety of UAVs has become a prime concern for UAV operators. For a swarm of UAVs, a safe operation can not be guaranteed without preventing the UAVs from colliding with one another and with static and dynamically appearing, moving obstacles in the flying zone. In this paper, we present an online, collision-free path generation and navigation system for swarms of UAVs. The proposed system uses geographical locations of the UAVs and of the successfully detected, static and moving obstacles to predict and avoid: (1) UAV-to-UAV collisions, (2) UAV-to-static-obstacle collisions, and (3) UAV-to-moving-obstacle collisions. Our collision prediction approach leverages efficient runtime monitoring and Complex Event Processing (CEP) to make timely predictions. A distinctive feature of the proposed system is its ability to foresee potential collisions and proactively find best ways to avoid predicted collisions in order to ensure safety of the entire swarm. We also present a simulation-based implementation of the proposed system along with an experimental evaluation involving a series of experiments and compare our results with the results of four existing approaches. The results show that the proposed system successfully predicts and avoids all three kinds of collisions in an online manner. Moreover, it generates safe and efficient UAV routes, efficiently scales to large-sized problem instances, and is suitable for cluttered flying zones and for scenarios involving high risks of UAV collisions.
△ Less
Submitted 19 December, 2019;
originally announced December 2019.
-
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Authors:
Zakaria El Mrabet,
Youness Arjoune,
Hassan El Ghazi,
Badr Abou Al Majd,
Naima Kaabouch
Abstract:
Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the cognitive radio network. Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal…
▽ More
Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference to the primary users. However, several attacks could disturb the normal functioning of the cognitive radio network. Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal characteristics to either prevent other legitimate secondary users from accessing the idle channels or causing harmful interference to the primary users. There are several proposed approaches to detect the primary user emulation attackers. However, most of these techniques assume that the primary user location is fixed, which does not make them valid when the primary user is mobile. In this paper, we propose a new approach based on the Kalman filter framework for detecting the primary user emulation attacks with a non-stationary primary user. Several experiments have been conducted and the advantages of the proposed approach are demonstrated through the simulation results.
△ Less
Submitted 8 March, 2019;
originally announced March 2019.
-
Parameterization adaption for 3D shape optimization in aerodynamics
Authors:
Badr Abou El Majd
Abstract:
When solving a PDE problem numerically, a certain mesh-refinement process is always implicit, and very classically, mesh adaptivity is a very effective means to accelerate grid convergence. Similarly, when optimizing a shape by means of an explicit geometrical representation, it is natural to seek for an analogous concept of parameterization adaptivity. We propose here an adaptive parameterization…
▽ More
When solving a PDE problem numerically, a certain mesh-refinement process is always implicit, and very classically, mesh adaptivity is a very effective means to accelerate grid convergence. Similarly, when optimizing a shape by means of an explicit geometrical representation, it is natural to seek for an analogous concept of parameterization adaptivity. We propose here an adaptive parameterization for three-dimensional optimum design in aerodynamics by using the so-called "Free-Form Deformation" approach based on 3D tensorial Bézier parameterization. The proposed procedure leads to efficient numerical simulations with highly reduced computational costs.
△ Less
Submitted 25 August, 2015;
originally announced September 2015.
-
QoS-Aware Joint Policies in Cognitive Radio Networks
Authors:
Saber Salehkaleybar,
Seyyed Arash Majd,
Mohammad Reza Pakravan
Abstract:
One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only guarantees QoS requirements but also maximizes network…
▽ More
One of the most challenging problems in Opportunistic Spectrum Access (OSA) is to design channel sensing-based protocol in multi secondary users (SUs) network. Quality of Service (QoS) requirements for SUs have significant implications on this protocol design. In this paper, we propose a new method to find joint policies for SUs which not only guarantees QoS requirements but also maximizes network throughput. We use Decentralized Partially Observable Markov Decision Process (Dec-POMDP) to formulate interactions between SUs. Meanwhile, a tractable approach for Dec-POMDP is utilized to extract sub-optimum joint policies for large horizons. Among these policies, the joint policy which guarantees QoS requirements is selected as the joint sensing strategy for SUs. To show the efficiency of the proposed method, we consider two SUs trying to access two-channel primary users (PUs) network modeled by discrete Markov chains. Simulations demonstrate three interesting findings: 1- Optimum joint policies for large horizons can be obtained using the proposed method. 2- There exists a joint policy for the assumed QoS constraints. 3- Our method outperforms other related works in terms of network throughput.
△ Less
Submitted 14 October, 2010;
originally announced October 2010.
-
A New Framework for Cognitive Medium Access Control: POSG Approach
Authors:
Saber Salehkaleybar,
Arash Majd,
Mohammad Reza Pakravan
Abstract:
In this paper, we propose a new analytical framework to solve medium access problem for secondary users (SUs) in cognitive radio networks. Partially Observable Stochastic Games (POSG) and Decentralized Markov Decision Process (Dec-POMDP) are two multi-agent Markovian decision processes which are used to present a solution. A primary network with two SUs is considered as an example to demonstrate o…
▽ More
In this paper, we propose a new analytical framework to solve medium access problem for secondary users (SUs) in cognitive radio networks. Partially Observable Stochastic Games (POSG) and Decentralized Markov Decision Process (Dec-POMDP) are two multi-agent Markovian decision processes which are used to present a solution. A primary network with two SUs is considered as an example to demonstrate our proposed framework. Two different scenarios are assumed. In the first scenario, SUs compete to acquire the licensed channel which is modeled using POSG framework. In the second one, SUs cooperate to access channel for which the solution is based on Dec-POMDP. Besides, the dominant strategy for both of the above mentioned scenarios is presented for a three slot horizon length.
△ Less
Submitted 14 October, 2010; v1 submitted 14 March, 2010;
originally announced March 2010.