-
CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence
Authors:
Md Tanvirul Alam,
Dipkamal Bhusal,
Le Nguyen,
Nidhi Rastogi
Abstract:
Cyber threat intelligence (CTI) is crucial in today's cybersecurity landscape, providing essential insights to understand and mitigate the ever-evolving cyber threats. The recent rise of Large Language Models (LLMs) have shown potential in this domain, but concerns about their reliability, accuracy, and hallucinations persist. While existing benchmarks provide general evaluations of LLMs, there ar…
▽ More
Cyber threat intelligence (CTI) is crucial in today's cybersecurity landscape, providing essential insights to understand and mitigate the ever-evolving cyber threats. The recent rise of Large Language Models (LLMs) have shown potential in this domain, but concerns about their reliability, accuracy, and hallucinations persist. While existing benchmarks provide general evaluations of LLMs, there are no benchmarks that address the practical and applied aspects of CTI-specific tasks. To bridge this gap, we introduce CTIBench, a benchmark designed to assess LLMs' performance in CTI applications. CTIBench includes multiple datasets focused on evaluating knowledge acquired by LLMs in the cyber-threat landscape. Our evaluation of several state-of-the-art models on these tasks provides insights into their strengths and weaknesses in CTI contexts, contributing to a better understanding of LLM capabilities in CTI.
△ Less
Submitted 24 June, 2024; v1 submitted 11 June, 2024;
originally announced June 2024.
-
SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory
Authors:
Dipkamal Bhusal,
Md Tanvirul Alam,
Le Nguyen,
Ashim Mahara,
Zachary Lightcap,
Rodney Frazier,
Romy Fieblinger,
Grace Long Torales,
Nidhi Rastogi
Abstract:
Large Language Models (LLMs) have demonstrated potential in cybersecurity applications but have also caused lower confidence due to problems like hallucinations and a lack of truthfulness. Existing benchmarks provide general evaluations but do not sufficiently address the practical and applied aspects of LLM performance in cybersecurity-specific tasks. To address this gap, we introduce the SECURE…
▽ More
Large Language Models (LLMs) have demonstrated potential in cybersecurity applications but have also caused lower confidence due to problems like hallucinations and a lack of truthfulness. Existing benchmarks provide general evaluations but do not sufficiently address the practical and applied aspects of LLM performance in cybersecurity-specific tasks. To address this gap, we introduce the SECURE (Security Extraction, Understanding \& Reasoning Evaluation), a benchmark designed to assess LLMs performance in realistic cybersecurity scenarios. SECURE includes six datasets focussed on the Industrial Control System sector to evaluate knowledge extraction, understanding, and reasoning based on industry-standard sources. Our study evaluates seven state-of-the-art models on these tasks, providing insights into their strengths and weaknesses in cybersecurity contexts, and offer recommendations for improving LLMs reliability as cyber advisory tools.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
FLARE up your data: Diffusion-based Augmentation Method in Astronomical Imaging
Authors:
Mohammed Talha Alam,
Raza Imam,
Mohsen Guizani,
Fakhri Karray
Abstract:
The intersection of Astronomy and AI encounters significant challenges related to issues such as noisy backgrounds, lower resolution (LR), and the intricate process of filtering and archiving images from advanced telescopes like the James Webb. Given the dispersion of raw images in feature space, we have proposed a \textit{two-stage augmentation framework} entitled as \textbf{FLARE} based on \unde…
▽ More
The intersection of Astronomy and AI encounters significant challenges related to issues such as noisy backgrounds, lower resolution (LR), and the intricate process of filtering and archiving images from advanced telescopes like the James Webb. Given the dispersion of raw images in feature space, we have proposed a \textit{two-stage augmentation framework} entitled as \textbf{FLARE} based on \underline{f}eature \underline{l}earning and \underline{a}ugmented \underline{r}esolution \underline{e}nhancement. We first apply lower (LR) to higher resolution (HR) conversion followed by standard augmentations. Secondly, we integrate a diffusion approach to synthetically generate samples using class-concatenated prompts. By merging these two stages using weighted percentiles, we realign the feature space distribution, enabling a classification model to establish a distinct decision boundary and achieve superior generalization on various in-domain and out-of-domain tasks. We conducted experiments on several downstream cosmos datasets and on our optimally distributed \textbf{SpaceNet} dataset across 8-class fine-grained and 4-class macro classification tasks. FLARE attains the highest performance gain of 20.78\% for fine-grained tasks compared to similar baselines, while across different classification models, FLARE shows a consistent increment of an average of +15\%. This outcome underscores the effectiveness of the FLARE method in enhancing the precision of image classification, ultimately bolstering the reliability of astronomical research outcomes. % Our code and SpaceNet dataset will be released to the public soon. Our code and SpaceNet dataset is available at \href{https://github.com/Razaimam45/PlanetX_Dxb}{\textit{https://github.com/Razaimam45/PlanetX\_Dxb}}.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis
Authors:
Dipkamal Bhusal,
Md Tanvirul Alam,
Monish K. Veerabhadran,
Michael Clifford,
Sara Rampazzi,
Nidhi Rastogi
Abstract:
Deep neural networks for classification are vulnerable to adversarial attacks, where small perturbations to input samples lead to incorrect predictions. This susceptibility, combined with the black-box nature of such networks, limits their adoption in critical applications like autonomous driving. Feature-attribution-based explanation methods provide relevance of input features for model predictio…
▽ More
Deep neural networks for classification are vulnerable to adversarial attacks, where small perturbations to input samples lead to incorrect predictions. This susceptibility, combined with the black-box nature of such networks, limits their adoption in critical applications like autonomous driving. Feature-attribution-based explanation methods provide relevance of input features for model predictions on input samples, thus explaining model decisions. However, we observe that both model predictions and feature attributions for input samples are sensitive to noise. We develop a practical method for this characteristic of model prediction and feature attribution to detect adversarial samples. Our method, PASA, requires the computation of two test statistics using model prediction and feature attribution and can reliably detect adversarial samples using thresholds learned from benign samples. We validate our lightweight approach by evaluating the performance of PASA on varying strengths of FGSM, PGD, BIM, and CW attacks on multiple image and non-image datasets. On average, we outperform state-of-the-art statistical unsupervised adversarial detectors on CIFAR-10 and ImageNet by 14\% and 35\% ROC-AUC scores, respectively. Moreover, our approach demonstrates competitive performance even when an adversary is aware of the defense mechanism.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
Modular Deep Active Learning Framework for Image Annotation: A Technical Report for the Ophthalmo-AI Project
Authors:
Md Abdul Kadir,
Hasan Md Tusfiqur Alam,
Pascale Maul,
Hans-Jürgen Profitlich,
Moritz Wolf,
Daniel Sonntag
Abstract:
Image annotation is one of the most essential tasks for guaranteeing proper treatment for patients and tracking progress over the course of therapy in the field of medical imaging and disease diagnosis. However, manually annotating a lot of 2D and 3D imaging data can be extremely tedious. Deep Learning (DL) based segmentation algorithms have completely transformed this process and made it possible…
▽ More
Image annotation is one of the most essential tasks for guaranteeing proper treatment for patients and tracking progress over the course of therapy in the field of medical imaging and disease diagnosis. However, manually annotating a lot of 2D and 3D imaging data can be extremely tedious. Deep Learning (DL) based segmentation algorithms have completely transformed this process and made it possible to automate image segmentation. By accurately segmenting medical images, these algorithms can greatly minimize the time and effort necessary for manual annotation. Additionally, by incorporating Active Learning (AL) methods, these segmentation algorithms can perform far more effectively with a smaller amount of ground truth data. We introduce MedDeepCyleAL, an end-to-end framework implementing the complete AL cycle. It provides researchers with the flexibility to choose the type of deep learning model they wish to employ and includes an annotation tool that supports the classification and segmentation of medical images. The user-friendly interface allows for easy alteration of the AL and DL model settings through a configuration file, requiring no prior programming experience. While MedDeepCyleAL can be applied to any kind of image data, we have specifically applied it to ophthalmology data in this project.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Authors:
Md Tanvirul Alam,
Romy Fieblinger,
Ashim Mahara,
Nidhi Rastogi
Abstract:
Concept drift is a significant challenge for malware detection, as the performance of trained machine learning models degrades over time, rendering them impractical. While prior research in malware concept drift adaptation has primarily focused on active learning, which involves selecting representative samples to update the model, self-training has emerged as a promising approach to mitigate conc…
▽ More
Concept drift is a significant challenge for malware detection, as the performance of trained machine learning models degrades over time, rendering them impractical. While prior research in malware concept drift adaptation has primarily focused on active learning, which involves selecting representative samples to update the model, self-training has emerged as a promising approach to mitigate concept drift. Self-training involves retraining the model using pseudo labels to adapt to shifting data distributions. In this research, we propose MORPH -- an effective pseudo-label-based concept drift adaptation method specifically designed for neural networks. Through extensive experimental analysis of Android and Windows malware datasets, we demonstrate the efficacy of our approach in mitigating the impact of concept drift. Our method offers the advantage of reducing annotation efforts when combined with active learning. Furthermore, our method significantly improves over existing works in automated concept drift adaptation for malware detection.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
Multi-Task Learning Approach for Unified Biometric Estimation from Fetal Ultrasound Anomaly Scans
Authors:
Mohammad Areeb Qazi,
Mohammed Talha Alam,
Ibrahim Almakky,
Werner Gerhard Diehl,
Leanne Bricker,
Mohammad Yaqub
Abstract:
Precise estimation of fetal biometry parameters from ultrasound images is vital for evaluating fetal growth, monitoring health, and identifying potential complications reliably. However, the automated computerized segmentation of the fetal head, abdomen, and femur from ultrasound images, along with the subsequent measurement of fetal biometrics, remains challenging. In this work, we propose a mult…
▽ More
Precise estimation of fetal biometry parameters from ultrasound images is vital for evaluating fetal growth, monitoring health, and identifying potential complications reliably. However, the automated computerized segmentation of the fetal head, abdomen, and femur from ultrasound images, along with the subsequent measurement of fetal biometrics, remains challenging. In this work, we propose a multi-task learning approach to classify the region into head, abdomen and femur as well as estimate the associated parameters. We were able to achieve a mean absolute error (MAE) of 1.08 mm on head circumference, 1.44 mm on abdomen circumference and 1.10 mm on femur length with a classification accuracy of 99.91\% on a dataset of fetal Ultrasound images. To achieve this, we leverage a weighted joint classification and segmentation loss function to train a U-Net architecture with an added classification head. The code can be accessed through \href{https://github.com/BioMedIA-MBZUAI/Multi-Task-Learning-Approach-for-Unified-Biometric-Estimation-from-Fetal-Ultrasound-Anomaly-Scans.git}{\texttt{Github}
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Enhancing Pipeline-Based Conversational Agents with Large Language Models
Authors:
Mina Foosherian,
Hendrik Purwins,
Purna Rathnayake,
Touhidul Alam,
Rui Teimao,
Klaus-Dieter Thoben
Abstract:
The latest advancements in AI and deep learning have led to a breakthrough in large language model (LLM)-based agents such as GPT-4. However, many commercial conversational agent development tools are pipeline-based and have limitations in holding a human-like conversation. This paper investigates the capabilities of LLMs to enhance pipeline-based conversational agents during two phases: 1) in the…
▽ More
The latest advancements in AI and deep learning have led to a breakthrough in large language model (LLM)-based agents such as GPT-4. However, many commercial conversational agent development tools are pipeline-based and have limitations in holding a human-like conversation. This paper investigates the capabilities of LLMs to enhance pipeline-based conversational agents during two phases: 1) in the design and development phase and 2) during operations. In 1) LLMs can aid in generating training data, extracting entities and synonyms, localization, and persona design. In 2) LLMs can assist in contextualization, intent classification to prevent conversational breakdown and handle out-of-scope questions, auto-correcting utterances, rephrasing responses, formulating disambiguation questions, summarization, and enabling closed question-answering capabilities. We conducted informal experiments with GPT-4 in the private banking domain to demonstrate the scenarios above with a practical example. Companies may be hesitant to replace their pipeline-based agents with LLMs entirely due to privacy concerns and the need for deep integration within their existing ecosystems. A hybrid approach in which LLMs' are integrated into the pipeline-based agents allows them to save time and costs of building and running agents by capitalizing on the capabilities of LLMs while retaining the integration and privacy safeguards of their existing systems.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Optimizing Brain Tumor Classification: A Comprehensive Study on Transfer Learning and Imbalance Handling in Deep Learning Models
Authors:
Raza Imam,
Mohammed Talha Alam
Abstract:
Deep learning has emerged as a prominent field in recent literature, showcasing the introduction of models that utilize transfer learning to achieve remarkable accuracies in the classification of brain tumor MRI images. However, the majority of these proposals primarily focus on balanced datasets, neglecting the inherent data imbalance present in real-world scenarios. Consequently, there is a pres…
▽ More
Deep learning has emerged as a prominent field in recent literature, showcasing the introduction of models that utilize transfer learning to achieve remarkable accuracies in the classification of brain tumor MRI images. However, the majority of these proposals primarily focus on balanced datasets, neglecting the inherent data imbalance present in real-world scenarios. Consequently, there is a pressing need for approaches that not only address the data imbalance but also prioritize precise classification of brain cancer. In this work, we present a novel deep learning-based approach, called Transfer Learning-CNN, for brain tumor classification using MRI data. The proposed model leverages the predictive capabilities of existing publicly available models by utilizing their pre-trained weights and transferring those weights to the CNN. By leveraging a publicly available Brain MRI dataset, the experiment evaluated various transfer learning models for classifying different tumor types, including meningioma, glioma, and pituitary tumors. We investigate the impact of different loss functions, including focal loss, and oversampling methods, such as SMOTE and ADASYN, in addressing the data imbalance issue. Notably, the proposed strategy, which combines VGG-16 and CNN, achieved an impressive accuracy rate of 96%, surpassing alternative approaches significantly.
△ Less
Submitted 13 August, 2023;
originally announced August 2023.
-
EdgeAL: An Edge Estimation Based Active Learning Approach for OCT Segmentation
Authors:
Md Abdul Kadir,
Hasan Md Tusfiqur Alam,
Daniel Sonntag
Abstract:
Active learning algorithms have become increasingly popular for training models with limited data. However, selecting data for annotation remains a challenging problem due to the limited information available on unseen data. To address this issue, we propose EdgeAL, which utilizes the edge information of unseen images as {\it a priori} information for measuring uncertainty. The uncertainty is quan…
▽ More
Active learning algorithms have become increasingly popular for training models with limited data. However, selecting data for annotation remains a challenging problem due to the limited information available on unseen data. To address this issue, we propose EdgeAL, which utilizes the edge information of unseen images as {\it a priori} information for measuring uncertainty. The uncertainty is quantified by analyzing the divergence and entropy in model predictions across edges. This measure is then used to select superpixels for annotation. We demonstrate the effectiveness of EdgeAL on multi-class Optical Coherence Tomography (OCT) segmentation tasks, where we achieved a 99% dice score while reducing the annotation label cost to 12%, 2.3%, and 3%, respectively, on three publicly available datasets (Duke, AROI, and UMN). The source code is available at \url{https://github.com/Mak-Ta-Reque/EdgeAL}
△ Less
Submitted 25 July, 2023; v1 submitted 20 July, 2023;
originally announced July 2023.
-
Brain Tumor Synthetic Data Generation with Adaptive StyleGANs
Authors:
Usama Tariq,
Rizwan Qureshi,
Anas Zafar,
Danyal Aftab,
Jia Wu,
Tanvir Alam,
Zubair Shah,
Hazrat Ali
Abstract:
Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of…
▽ More
Generative models have been very successful over the years and have received significant attention for synthetic data generation. As deep learning models are getting more and more complex, they require large amounts of data to perform accurately. In medical image analysis, such generative models play a crucial role as the available data is limited due to challenges related to data privacy, lack of data diversity, or uneven data distributions. In this paper, we present a method to generate brain tumor MRI images using generative adversarial networks. We have utilized StyleGAN2 with ADA methodology to generate high-quality brain MRI with tumors while using a significantly smaller amount of training data when compared to the existing approaches. We use three pre-trained models for transfer learning. Results demonstrate that the proposed method can learn the distributions of brain tumors. Furthermore, the model can generate high-quality synthetic brain MRI with a tumor that can limit the small sample size issues. The approach can addresses the limited data availability by generating realistic-looking brain MRI with tumors. The code is available at: ~\url{https://github.com/rizwanqureshi123/Brain-Tumor-Synthetic-Data}.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Authors:
Md Tanvirul Alam,
Dipkamal Bhusal,
Youngja Park,
Nidhi Rastogi
Abstract:
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to prepare systems to defend against existing and emerging cyberattacks. However, traditional CTI has primarily focused on tracking known threat indicators such as IP addresses and domain names, which may not provide long-term value in defending against evolving attacks. To address this challenge, we propose to us…
▽ More
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to prepare systems to defend against existing and emerging cyberattacks. However, traditional CTI has primarily focused on tracking known threat indicators such as IP addresses and domain names, which may not provide long-term value in defending against evolving attacks. To address this challenge, we propose to use more robust threat intelligence signals called attack patterns. LADDER is a knowledge extraction framework that can extract text-based attack patterns from CTI reports at scale. The framework characterizes attack patterns by capturing the phases of an attack in Android and enterprise networks and systematically maps them to the MITRE ATT\&CK pattern framework. LADDER can be used by security analysts to determine the presence of attack vectors related to existing and emerging threats, enabling them to prepare defenses proactively. We also present several use cases to demonstrate the application of LADDER in real-world scenarios. Finally, we provide a new, open-access benchmark malware dataset to train future cyberthreat intelligence models.
△ Less
Submitted 11 July, 2023; v1 submitted 1 November, 2022;
originally announced November 2022.
-
Label Flip** Data Poisoning Attack Against Wearable Human Activity Recognition System
Authors:
Abdur R. Shahid,
Ahmed Imteaj,
Peter Y. Wu,
Diane A. Igoche,
Tauhidul Alam
Abstract:
Human Activity Recognition (HAR) is a problem of interpreting sensor data to human movement using an efficient machine learning (ML) approach. The HAR systems rely on data from untrusted users, making them susceptible to data poisoning attacks. In a poisoning attack, attackers manipulate the sensor readings to contaminate the training set, misleading the HAR to produce erroneous outcomes. This pap…
▽ More
Human Activity Recognition (HAR) is a problem of interpreting sensor data to human movement using an efficient machine learning (ML) approach. The HAR systems rely on data from untrusted users, making them susceptible to data poisoning attacks. In a poisoning attack, attackers manipulate the sensor readings to contaminate the training set, misleading the HAR to produce erroneous outcomes. This paper presents the design of a label flip** data poisoning attack for a HAR system, where the label of a sensor reading is maliciously changed in the data collection phase. Due to high noise and uncertainty in the sensing environment, such an attack poses a severe threat to the recognition system. Besides, vulnerability to label flip** attacks is dangerous when activity recognition models are deployed in safety-critical applications. This paper shades light on how to carry out the attack in practice through smartphone-based sensor data collection applications. This is an earlier research work, to our knowledge, that explores attacking the HAR models via label flip** poisoning. We implement the proposed attack and test it on activity recognition models based on the following machine learning algorithms: multi-layer perceptron, decision tree, random forest, and XGBoost. Finally, we evaluate the effectiveness of K-nearest neighbors (KNN)-based defense mechanism against the proposed attack.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
CyNER: A Python Library for Cybersecurity Named Entity Recognition
Authors:
Md Tanvirul Alam,
Dipkamal Bhusal,
Youngja Park,
Nidhi Rastogi
Abstract:
Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet. We present CyNER, an open-source python library for cybersecurity named entity recognition (NER). CyNER combines transformer-based models for extracting cybersecurity-related entities, heuristics for extracting different indicators of compromise, and publicly avai…
▽ More
Open Cyber threat intelligence (OpenCTI) information is available in an unstructured format from heterogeneous sources on the Internet. We present CyNER, an open-source python library for cybersecurity named entity recognition (NER). CyNER combines transformer-based models for extracting cybersecurity-related entities, heuristics for extracting different indicators of compromise, and publicly available NER models for generic entity types. We provide models trained on a diverse corpus that users can readily use. Events are described as classes in previous research - MALOnt2.0 (Christian et al., 2021) and MALOnt (Rastogi et al., 2020) and together extract a wide range of malware attack details from a threat intelligence corpus. The user can combine predictions from multiple different approaches to suit their needs. The library is made publicly available.
△ Less
Submitted 8 April, 2022;
originally announced April 2022.
-
MEDIC: A Multi-Task Learning Dataset for Disaster Image Classification
Authors:
Firoj Alam,
Tanvirul Alam,
Md. Arid Hasan,
Abul Hasnat,
Muhammad Imran,
Ferda Ofli
Abstract:
Recent research in disaster informatics demonstrates a practical and important use case of artificial intelligence to save human lives and suffering during natural disasters based on social media contents (text and images). While notable progress has been made using texts, research on exploiting the images remains relatively under-explored. To advance image-based approaches, we propose MEDIC (Avai…
▽ More
Recent research in disaster informatics demonstrates a practical and important use case of artificial intelligence to save human lives and suffering during natural disasters based on social media contents (text and images). While notable progress has been made using texts, research on exploiting the images remains relatively under-explored. To advance image-based approaches, we propose MEDIC (Available at: https://crisisnlp.qcri.org/medic/index.html), which is the largest social media image classification dataset for humanitarian response consisting of 71,198 images to address four different tasks in a multi-task learning setup. This is the first dataset of its kind: social media images, disaster response, and multi-task learning research. An important property of this dataset is its high potential to facilitate research on multi-task learning, which recently receives much interest from the machine learning community and has shown remarkable results in terms of memory, inference speed, performance, and generalization capability. Therefore, the proposed dataset is an important resource for advancing image-based disaster management and multi-task machine learning research. We experiment with different deep learning architectures and report promising results, which are above the majority baselines for all tasks. Along with the dataset, we also release all relevant scripts (https://github.com/firojalam/medic).
△ Less
Submitted 8 June, 2022; v1 submitted 29 August, 2021;
originally announced August 2021.
-
A Review of Bangla Natural Language Processing Tasks and the Utility of Transformer Models
Authors:
Firoj Alam,
Arid Hasan,
Tanvirul Alam,
Akib Khan,
Janntatul Tajrin,
Naira Khan,
Shammur Absar Chowdhury
Abstract:
Bangla -- ranked as the 6th most widely spoken language across the world (https://www.ethnologue.com/guides/ethnologue200), with 230 million native speakers -- is still considered as a low-resource language in the natural language processing (NLP) community. With three decades of research, Bangla NLP (BNLP) is still lagging behind mainly due to the scarcity of resources and the challenges that com…
▽ More
Bangla -- ranked as the 6th most widely spoken language across the world (https://www.ethnologue.com/guides/ethnologue200), with 230 million native speakers -- is still considered as a low-resource language in the natural language processing (NLP) community. With three decades of research, Bangla NLP (BNLP) is still lagging behind mainly due to the scarcity of resources and the challenges that come with it. There is sparse work in different areas of BNLP; however, a thorough survey reporting previous work and recent advances is yet to be done. In this study, we first provide a review of Bangla NLP tasks, resources, and tools available to the research community; we benchmark datasets collected from various platforms for nine NLP tasks using current state-of-the-art algorithms (i.e., transformer-based models). We provide comparative results for the studied NLP tasks by comparing monolingual vs. multilingual models of varying sizes. We report our results using both individual and consolidated datasets and provide data splits for future research. We reviewed a total of 108 papers and conducted 175 sets of experiments. Our results show promising performance using transformer-based models while highlighting the trade-off with computational costs. We hope that such a comprehensive survey will motivate the community to build on and further advance the research on Bangla NLP.
△ Less
Submitted 25 July, 2021; v1 submitted 8 July, 2021;
originally announced July 2021.
-
Searching for Scientific Evidence in a Pandemic: An Overview of TREC-COVID
Authors:
Kirk Roberts,
Tasmeer Alam,
Steven Bedrick,
Dina Demner-Fushman,
Kyle Lo,
Ian Soboroff,
Ellen Voorhees,
Lucy Lu Wang,
William R Hersh
Abstract:
We present an overview of the TREC-COVID Challenge, an information retrieval (IR) shared task to evaluate search on scientific literature related to COVID-19. The goals of TREC-COVID include the construction of a pandemic search test collection and the evaluation of IR methods for COVID-19. The challenge was conducted over five rounds from April to July, 2020, with participation from 92 unique tea…
▽ More
We present an overview of the TREC-COVID Challenge, an information retrieval (IR) shared task to evaluate search on scientific literature related to COVID-19. The goals of TREC-COVID include the construction of a pandemic search test collection and the evaluation of IR methods for COVID-19. The challenge was conducted over five rounds from April to July, 2020, with participation from 92 unique teams and 556 individual submissions. A total of 50 topics (sets of related queries) were used in the evaluation, starting at 30 topics for Round 1 and adding 5 new topics per round to target emerging topics at that state of the still-emerging pandemic. This paper provides a comprehensive overview of the structure and results of TREC-COVID. Specifically, the paper provides details on the background, task structure, topic structure, corpus, participation, pooling, assessment, judgments, results, top-performing systems, lessons learned, and benchmark datasets.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
Robust Training of Social Media Image Classification Models for Rapid Disaster Response
Authors:
Firoj Alam,
Tanvirul Alam,
Muhammad Imran,
Ferda Ofli
Abstract:
Images shared on social media help crisis managers gain situational awareness and assess incurred damages, among other response tasks. As the volume and velocity of such content are typically high, real-time image classification has become an urgent need for a faster disaster response. Recent advances in computer vision and deep neural networks have enabled the development of models for real-time…
▽ More
Images shared on social media help crisis managers gain situational awareness and assess incurred damages, among other response tasks. As the volume and velocity of such content are typically high, real-time image classification has become an urgent need for a faster disaster response. Recent advances in computer vision and deep neural networks have enabled the development of models for real-time image classification for a number of tasks, including detecting crisis incidents, filtering irrelevant images, classifying images into specific humanitarian categories, and assessing the severity of the damage. To develop robust real-time models, it is necessary to understand the capability of the publicly available pre-trained models for these tasks, which remains to be under-explored in the crisis informatics literature. In this study, we address such limitations by investigating ten different network architectures for four different tasks using the largest publicly available datasets for these tasks. We also explore various data augmentation strategies, semi-supervised techniques, and a multitask learning setup. In our extensive experiments, we achieve promising results.
△ Less
Submitted 19 July, 2021; v1 submitted 9 April, 2021;
originally announced April 2021.
-
Contact Tracing Apps for COVID-19: Access Permission and User Adoption
Authors:
Amal Awadalla Ali,
Asma Hamid ElFadl,
Maha Fawzy Abujazar,
Sarah Aziz,
Alaa Abd-Alrazaq,
Zubair Shah,
Samir Brahim Belhaouari,
Mowafa Househ,
Tanvir Alam
Abstract:
Contact tracing apps are powerful software tools that can help control the spread of COVID-19. In this article, we evaluated 53 COVID-19 contact tracing apps found on the Google Play Store in terms of their usage, rating, access permission, and user privacy. For each app included in the study, we identified the country of origin, number of downloads, and access permissions to further understand th…
▽ More
Contact tracing apps are powerful software tools that can help control the spread of COVID-19. In this article, we evaluated 53 COVID-19 contact tracing apps found on the Google Play Store in terms of their usage, rating, access permission, and user privacy. For each app included in the study, we identified the country of origin, number of downloads, and access permissions to further understand the attributes and ratings of the apps. Our results show that contact tracing apps had low overall ratings and nearly 40% of the included apps were requesting dangerous access permission including access to storage, media files, and camera permissions. We also found that user adoption rates were inversely correlated to access permission requirements. To the best of our knowledge, our article summarizes the most extensive collection of contact tracing apps for COVID-19. We recommend that future contact tracing apps should be more transparent in permission requirements and should provide justification for permissions requested to preserve the app users privacy.
△ Less
Submitted 6 February, 2021;
originally announced February 2021.
-
Social Network Analysis of Hadith Narrators from Sahih Bukhari
Authors:
Tanvir Alam,
Jens Schneider
Abstract:
The ahadith, prophetic traditions for the Muslims around the world, are narrations originating from the sayings and the deeds of Prophet Muhammad (pbuh). They are considered one of the fundamental sources of Islamic legislation along with the Quran. The list of persons involved in the narration of each hadith is carefully scrutinized by scholars studying the hadith, with respect to their reputatio…
▽ More
The ahadith, prophetic traditions for the Muslims around the world, are narrations originating from the sayings and the deeds of Prophet Muhammad (pbuh). They are considered one of the fundamental sources of Islamic legislation along with the Quran. The list of persons involved in the narration of each hadith is carefully scrutinized by scholars studying the hadith, with respect to their reputation and authenticity of the hadith. This is due to the its legislative importance in Islamic principles. There were many narrators who contributed to this responsibility of preserving prophetic narrations over the centuries. But to date, no systematic and comprehensive study, based on the social network, has been adapted to understand the contribution of early hadith narrators and the propagation of hadith across generations. In this study, we represented the chain of narrators of the hadith collection from Sahih Bukhari as a social graph. Based on social network analysis (SNA) on this graph, we found that the network of narrators is a scale-free network. We identified a list of influential narrators from the companions as well as the narrators from the second and third-generation who contribute significantly in the propagation of hadith collected in Sahih Bukhari. We discovered sixteen communities from the narrators of Sahih Bukhari. In each of these communities, there are other narrators who contributed significantly to the propagation of prophetic narrations. We also found that most narrators were centered in Makkah and Madinah in the era of companions and, then, gradually the center of hadith narrators shifted towards Kufa, Baghdad and central Asia over a period of time. To the best of our knowledge, this the first comprehensive and systematic study based on SNA, representing the narrators as a social graph to analyze their contribution to the preservation and propagation of hadith.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Deep Learning Benchmarks and Datasets for Social Media Image Classification for Disaster Response
Authors:
Firoj Alam,
Ferda Ofli,
Muhammad Imran,
Tanvirul Alam,
Umair Qazi
Abstract:
During a disaster event, images shared on social media helps crisis managers gain situational awareness and assess incurred damages, among other response tasks. Recent advances in computer vision and deep neural networks have enabled the development of models for real-time image classification for a number of tasks, including detecting crisis incidents, filtering irrelevant images, classifying ima…
▽ More
During a disaster event, images shared on social media helps crisis managers gain situational awareness and assess incurred damages, among other response tasks. Recent advances in computer vision and deep neural networks have enabled the development of models for real-time image classification for a number of tasks, including detecting crisis incidents, filtering irrelevant images, classifying images into specific humanitarian categories, and assessing the severity of damage. Despite several efforts, past works mainly suffer from limited resources (i.e., labeled images) available to train more robust deep learning models. In this study, we propose new datasets for disaster type detection, and informativeness classification, and damage severity assessment. Moreover, we relabel existing publicly available datasets for new tasks. We identify exact- and near-duplicates to form non-overlap** data splits, and finally consolidate them to create larger datasets. In our extensive experiments, we benchmark several state-of-the-art deep learning models and achieve promising results. We release our datasets and models publicly, aiming to provide proper baselines as well as to spur further research in the crisis informatics community.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Bangla Text Classification using Transformers
Authors:
Tanvirul Alam,
Akib Khan,
Firoj Alam
Abstract:
Text classification has been one of the earliest problems in NLP. Over time the scope of application areas has broadened and the difficulty of dealing with new areas (e.g., noisy social media content) has increased. The problem-solving strategy switched from classical machine learning to deep learning algorithms. One of the recent deep neural network architecture is the Transformer. Models designe…
▽ More
Text classification has been one of the earliest problems in NLP. Over time the scope of application areas has broadened and the difficulty of dealing with new areas (e.g., noisy social media content) has increased. The problem-solving strategy switched from classical machine learning to deep learning algorithms. One of the recent deep neural network architecture is the Transformer. Models designed with this type of network and its variants recently showed their success in many downstream natural language processing tasks, especially for resource-rich languages, e.g., English. However, these models have not been explored fully for Bangla text classification tasks. In this work, we fine-tune multilingual transformer models for Bangla text classification tasks in different domains, including sentiment analysis, emotion detection, news categorization, and authorship attribution. We obtain the state of the art results on six benchmark datasets, improving upon the previous results by 5-29% accuracy across different tasks.
△ Less
Submitted 9 November, 2020;
originally announced November 2020.
-
Genetic Algorithm: Reviews, Implementations, and Applications
Authors:
Tanweer Alam,
Shamimul Qamar,
Amit Dixit,
Mohamed Benaida
Abstract:
Nowadays genetic algorithm (GA) is greatly used in engineering pedagogy as an adaptive technique to learn and solve complex problems and issues. It is a meta-heuristic approach that is used to solve hybrid computation challenges. GA utilizes selection, crossover, and mutation operators to effectively manage the searching system strategy. This algorithm is derived from natural selection and genetic…
▽ More
Nowadays genetic algorithm (GA) is greatly used in engineering pedagogy as an adaptive technique to learn and solve complex problems and issues. It is a meta-heuristic approach that is used to solve hybrid computation challenges. GA utilizes selection, crossover, and mutation operators to effectively manage the searching system strategy. This algorithm is derived from natural selection and genetics concepts. GA is an intelligent use of random search supported with historical data to contribute the search in an area of the improved outcome within a coverage framework. Such algorithms are widely used for maintaining high-quality reactions to optimize issues and problems investigation. These techniques are recognized to be somewhat of a statistical investigation process to search for a suitable solution or prevent an accurate strategy for challenges in optimization or searches. These techniques have been produced from natural selection or genetics principles. For random testing, historical information is provided with intelligent enslavement to continue moving the search out from the area of improved features for processing of the outcomes. It is a category of heuristics of evolutionary history using behavioral science-influenced methods like an annuity, gene, preference, or combination (sometimes refers to as hybridization). This method seemed to be a valuable tool to find solutions for problems optimization. In this paper, the author has explored the GAs, its role in engineering pedagogies, and the emerging areas where it is using, and its implementation.
△ Less
Submitted 5 June, 2020;
originally announced July 2020.
-
Blockchain, Fog and IoT Integrated Framework: Review, Architecture and Evaluation
Authors:
Tanweer Alam,
Mohamed Benaida
Abstract:
In the next-generation computing, the role of cloud, internet, and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store and process big data in the cloud. The fogging acts as an interface betw…
▽ More
In the next-generation computing, the role of cloud, internet, and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store and process big data in the cloud. The fogging acts as an interface between cloud and IoT. The IoT nodes are also known as fog nodes, these nodes are able to access anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Develo** new blockchains based integrated framework in the architecture of the IoT is one of the emerging approaches to solving the issue of communication security among the IoT public nodes. This research explores a novel approach to integrate blockchain technology with the fog and IoT networks and provides communication security to the internet of smart devices. The framework is tested and implemented in the IoT network. The results are found positive.
△ Less
Submitted 5 June, 2020;
originally announced June 2020.
-
COVID-19Base: A knowledgebase to explore biomedical entities related to COVID-19
Authors:
Junaed Younus Khan,
Md. Tawkat Islam Khondaker,
Iram Tazim Hoque,
Hamada Al-Absi,
Mohammad Saifur Rahman,
Tanvir Alam,
M. Sohel Rahman
Abstract:
We are presenting COVID-19Base, a knowledgebase highlighting the biomedical entities related to COVID-19 disease based on literature mining. To develop COVID-19Base, we mine the information from publicly available scientific literature and related public resources. We considered seven topic-specific dictionaries, including human genes, human miRNAs, human lncRNAs, diseases, Protein Databank, drugs…
▽ More
We are presenting COVID-19Base, a knowledgebase highlighting the biomedical entities related to COVID-19 disease based on literature mining. To develop COVID-19Base, we mine the information from publicly available scientific literature and related public resources. We considered seven topic-specific dictionaries, including human genes, human miRNAs, human lncRNAs, diseases, Protein Databank, drugs, and drug side effects, are integrated to mine all scientific evidence related to COVID-19. We have employed an automated literature mining and labeling system through a novel approach to measure the effectiveness of drugs against diseases based on natural language processing, sentiment analysis, and deep learning. To the best of our knowledge, this is the first knowledgebase dedicated to COVID-19, which integrates such large variety of related biomedical entities through literature mining. Proper investigation of the mined biomedical entities along with the identified interactions among those, reported in COVID-19Base, would help the research community to discover possible ways for the therapeutic treatment of COVID-19.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
TREC-COVID: Constructing a Pandemic Information Retrieval Test Collection
Authors:
Ellen Voorhees,
Tasmeer Alam,
Steven Bedrick,
Dina Demner-Fushman,
William R Hersh,
Kyle Lo,
Kirk Roberts,
Ian Soboroff,
Lucy Lu Wang
Abstract:
TREC-COVID is a community evaluation designed to build a test collection that captures the information needs of biomedical researchers using the scientific literature during a pandemic. One of the key characteristics of pandemic search is the accelerated rate of change: the topics of interest evolve as the pandemic progresses and the scientific literature in the area explodes. The COVID-19 pandemi…
▽ More
TREC-COVID is a community evaluation designed to build a test collection that captures the information needs of biomedical researchers using the scientific literature during a pandemic. One of the key characteristics of pandemic search is the accelerated rate of change: the topics of interest evolve as the pandemic progresses and the scientific literature in the area explodes. The COVID-19 pandemic provides an opportunity to capture this progression as it happens. TREC-COVID, in creating a test collection around COVID-19 literature, is building infrastructure to support new research and technologies in pandemic search.
△ Less
Submitted 9 May, 2020;
originally announced May 2020.
-
Blind Source Separation for NMR Spectra with Negative Intensity
Authors:
Ryan J. McCarty,
Nimish Ronghe,
Mandy Woo,
Todd M. Alam
Abstract:
NMR spectral datasets, especially in systems with limited samples, can be difficult to interpret if they contain multiple chemical components (phases, polymorphs, molecules, crystals, glasses, etc...) and the possibility of overlap** resonances. In this paper, we benchmark several blind source separation techniques for analysis of NMR spectral datasets containing negative intensity. For benchmar…
▽ More
NMR spectral datasets, especially in systems with limited samples, can be difficult to interpret if they contain multiple chemical components (phases, polymorphs, molecules, crystals, glasses, etc...) and the possibility of overlap** resonances. In this paper, we benchmark several blind source separation techniques for analysis of NMR spectral datasets containing negative intensity. For benchmarking purposes, we generated a large synthetic datasbase of quadrupolar solid-state NMR-like spectra that model spin-lattice T1 relaxation or nutation tip/flip angle experiments. Our benchmarking approach focused exclusively on the ability of blind source separation techniques to reproduce the spectra of the underlying pure components. In general, we find that FastICA (Fast Independent Component Analysis), SIMPLISMA (SIMPLe-to-use-Interactive Self-modeling Mixture Analysis), and NNMF (Non-Negative Matrix Factorization) are top-performing techniques. We demonstrate that dataset normalization approaches prior to blind source separation do not considerably improve outcomes. Within the range of noise levels studied, we did not find drastic changes to the ranking of techniques. The accuracy of FastICA and SIMPLISMA degrades quickly if excess (unreal) pure components are predicted. Our results indicate poor performance of SVD (Singular Value Decomposition) methods, and we propose alternative techniques for matrix initialization. The benchmarked techniques are also applied to real solid state NMR datasets. In general, the recommendations from the synthetic datasets agree with the recommendations and results from the real data analysis. The discussion provides some additional recommendations for spectroscopists applying blind source separation to NMR datasets, and for future benchmark studies.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
Feedback Motion Planning for Long-Range Autonomous Underwater Vehicles
Authors:
Opeyemi S. Orioke,
Tauhidul Alam,
Joseph Quinn,
Ramneek Kaur,
Wesam H. Alsabban,
Leonardo Bobadilla,
Ryan N. Smith
Abstract:
Ocean ecosystems have spatiotemporal variability and dynamic complexity that require a long-term deployment of an autonomous underwater vehicle for data collection. A new long-range autonomous underwater vehicle called Tethys is adapted to study different oceanic phenomena. Additionally, an ocean environment has external forces and moments along with changing water currents which are generally not…
▽ More
Ocean ecosystems have spatiotemporal variability and dynamic complexity that require a long-term deployment of an autonomous underwater vehicle for data collection. A new long-range autonomous underwater vehicle called Tethys is adapted to study different oceanic phenomena. Additionally, an ocean environment has external forces and moments along with changing water currents which are generally not considered in a vehicle kinematic model. In this scenario, it is not enough to generate a simple trajectory from an initial location to a goal location in an uncertain ocean as the vehicle can deviate from its intended trajectory. As such, we propose to compute a feedback plan that adapts the vehicle trajectory in the presence of any modeled or unmodeled uncertainties. In this work, we present a feedback motion planning method for the Tethys vehicle by combining a predictive ocean model and its kinematic modeling. Given a goal location, the Tethys kinematic model, and the water flow pattern, our method computes a feedback plan for the vehicle in a dynamic ocean environment that reduces its energy consumption. The computed feedback plan provides the optimal action for the Tethys vehicle to take from any location of the environment to reach the goal location considering its orientation. Our results based on actual ocean model prediction data demonstrate the applicability of our method.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Tactile Internet and its Contribution in the Development of Smart Cities
Authors:
Tanweer Alam
Abstract:
The Tactile Internet (TI) is an emerging technology next to the Internet of Things (IoT). It is a revolution to develop the smart cities, communities and cultures in the future. This technology will allow the real-time interaction between human and machines as well as machine-to-machine with the 1ms challenge to achieve in round trip latency. The term TI is defined by International Telecommunicati…
▽ More
The Tactile Internet (TI) is an emerging technology next to the Internet of Things (IoT). It is a revolution to develop the smart cities, communities and cultures in the future. This technology will allow the real-time interaction between human and machines as well as machine-to-machine with the 1ms challenge to achieve in round trip latency. The term TI is defined by International Telecommunication Union (ITU) in August 2014. The TI provides fast, reliable, secure and available internet network that is the requirements of the smart cities in 5G. Tactile internet can develop the part of world where the machines are strong and human are weak. It increases the power of machines so that the value of human power will increase automatically. In this framework, we have presented the idea of tactile internet for the next generation smart cities. This research will provide a high-performance reliable framework for the internet of smart devices to communicate with each other in a real-time (1ms round trip) using IEEE 1918.1 standard. The objective of this research is expected to bring a new dimension in the research of the smart cities.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
IoT-Fog: A Communication Framework using Blockchain in the Internet of Things
Authors:
Tanweer Alam
Abstract:
In big cloud structures or large data structures, fog computing could be interpreted, referring critically to the growing issues and problems in accessing the information among the Internet of things (IoT) devices. Fog computing can be used to compute, store, control and connect smart devices to each other. IoT is an architecture of uniquely identified interrelated physical things, these physical…
▽ More
In big cloud structures or large data structures, fog computing could be interpreted, referring critically to the growing issues and problems in accessing the information among the Internet of things (IoT) devices. Fog computing can be used to compute, store, control and connect smart devices to each other. IoT is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secure technology that can be a great benefit to the next generation computing. The confluence of fog, blockchains, and IoT in this area introduces a new incentive. In this research work, the author mentions the convergence of blockchain, fog and IoT technological innovations to present an effective communication framework. The framework is implemented and tested using different scenarios.
△ Less
Submitted 3 June, 2020; v1 submitted 30 March, 2019;
originally announced April 2019.
-
Blockchain and its Role in the Internet of Things (IoT)
Authors:
Tanweer Alam
Abstract:
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data. The transactions in BC are the basic units that are used to…
▽ More
Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data. The transactions in BC are the basic units that are used to transfer data between IoT nodes. The IoT nodes are different kind of physical but smart devices with embedded sensors, actuators, programs and able to communicate with other IoT nodes. The role of BC in IoT is to provide a procedure to process secured records of data through IoT nodes. BC is a secured technology that can be used publicly and openly. IoT requires this kind of technology to allow secure communication among IoT nodes in heterogeneous environment. The transactions in BC could be traced and explored through anyone who are authenticated to communicate within the IoT. The BC in IoT may help to improve the communication security. In this paper, I explored this approach, its opportunities and challenges.
△ Less
Submitted 5 June, 2020; v1 submitted 26 February, 2019;
originally announced February 2019.
-
Middleware Implementation in Cloud-MANET Mobility Model for Internet of Smart Devices
Authors:
Tanweer Alam
Abstract:
The smart devices are extremely useful devices that are making our lives easier than before. A smart device is facilitated us to establish a connection with another smart device in a wireless network with a decentralized approach. The mobile ad hoc network (MANET) is a novel methodology that discovers neighborhood devices and establishes connection among them without centralized infrastructure. Cl…
▽ More
The smart devices are extremely useful devices that are making our lives easier than before. A smart device is facilitated us to establish a connection with another smart device in a wireless network with a decentralized approach. The mobile ad hoc network (MANET) is a novel methodology that discovers neighborhood devices and establishes connection among them without centralized infrastructure. Cloud provides service to the MANET users to access cloud and communicates with another MANET users. In this article, I integrated MANET and cloud together and formed a new mobility model named Cloud-MANET. In this Mobility model, if one smart device of MANET is able to connect to the internet then all smart devices are enabled to use cloud service and can be interacted with another smart device in the Cloud-MANET framework. A middleware acts as an interface between MANET and cloud. The objective of this article is to implement a middleware in Cloud-MANET mobility model for communication on internet of smart devices.
△ Less
Submitted 5 June, 2020; v1 submitted 26 February, 2019;
originally announced February 2019.
-
The Role of Cloud-MANET Framework in the Internet of Things (IoT)
Authors:
Tanweer Alam,
Mohamed Benaida
Abstract:
In the next generation of computing, Mobile ad-hoc network (MANET) will play a very important role in the Internet of Things (IoT). The MANET is a kind of wireless networks that are self-organizing and auto connected in a decentralized system. Every device in MANET can be moved freely from one location to another in any direction. They can create a network with their neighbors smart devices and fo…
▽ More
In the next generation of computing, Mobile ad-hoc network (MANET) will play a very important role in the Internet of Things (IoT). The MANET is a kind of wireless networks that are self-organizing and auto connected in a decentralized system. Every device in MANET can be moved freely from one location to another in any direction. They can create a network with their neighbors smart devices and forward data to another device. The IoT-Cloud-MANET framework of smart devices is composed of IoT, cloud computing, and MANET. This framework can access and deliver cloud services to the MANET users through their smart devices in the IoT framework where all computations, data handling, and resource management are performed. The smart devices can move from one location to another within the range of the MANET network. Various MANETs can connect to the same cloud, they can use cloud service in a real time. For connecting the smart device of MANET to cloud needs integration with mobile apps. My main contribution in this research links a new methodology for providing secure communication on the internet of smart devices using MANET Concept in 5G. The research methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G.
△ Less
Submitted 5 June, 2020; v1 submitted 25 February, 2019;
originally announced February 2019.
-
An Underactuated Vehicle Localization Method in Marine Environments
Authors:
Tauhidul Alam,
Gregory Murad Reis,
Leonardo Bobadilla,
Ryan N. Smith
Abstract:
The underactuated vehicles are apposite for the long-term deployment and data collection in spatiotemporally varying marine environments. However, these vehicles need to estimate their positions (states) with intrinsic sensing in their long-term trajectories. In previous studies, autonomous underwater vehicles have commonly used vision and range sensors for autonomous state estimation. Inspired by…
▽ More
The underactuated vehicles are apposite for the long-term deployment and data collection in spatiotemporally varying marine environments. However, these vehicles need to estimate their positions (states) with intrinsic sensing in their long-term trajectories. In previous studies, autonomous underwater vehicles have commonly used vision and range sensors for autonomous state estimation. Inspired by the intrinsic sensing and the persistent deployment, we investigate the localization problem (state estimation) for an inexpensive and underactuated drifting vehicle called a drifter. In this paper, we present a localization method for the drifter making use of the observations of a proprioceptive sensor, i.e., compass. We create the water flow pattern within a given region from ocean model predictions, develop a stochastic motion model, and analyze the persistent water flow behavior. Given a distribution of initial deployment states of the drifter at a particular depth of the water column within the region and the water flow pattern, our method finds attractors and their transient groups at the given depth as the persistent behavior of the water flow. A most-likely localized trajectory of the drifter for a sequence of compass observations is generated based on the persistent behavior of the water flow and hidden Markov model. Our simulation results based on data from ocean model predictions substantiate good performance of our proposed localization method with a low error rate of the state estimation in the long-term trajectory of the drifter.
△ Less
Submitted 15 August, 2018;
originally announced August 2018.