-
A Digital Twin prototype for traffic sign recognition of a learning-enabled autonomous vehicle
Authors:
Mohamed AbdElSalam,
Loai Ali,
Saddek Bensalem,
Weicheng He,
Panagiotis Katsaros,
Nikolaos Kekatos,
Doron Peled,
Anastasios Temperekidis,
Changshun Wu
Abstract:
In this paper, we present a novel digital twin prototype for a learning-enabled self-driving vehicle. The primary objective of this digital twin is to perform traffic sign recognition and lane kee**. The digital twin architecture relies on co-simulation and uses the Functional Mock-up Interface and SystemC Transaction Level Modeling standards. The digital twin consists of four clients, i) a vehi…
▽ More
In this paper, we present a novel digital twin prototype for a learning-enabled self-driving vehicle. The primary objective of this digital twin is to perform traffic sign recognition and lane kee**. The digital twin architecture relies on co-simulation and uses the Functional Mock-up Interface and SystemC Transaction Level Modeling standards. The digital twin consists of four clients, i) a vehicle model that is designed in Amesim tool, ii) an environment model developed in Prescan, iii) a lane-kee** controller designed in Robot Operating System, and iv) a perception and speed control module developed in the formal modeling language of BIP (Behavior, Interaction, Priority). These clients interface with the digital twin platform, PAVE360-Veloce System Interconnect (PAVE360-VSI). PAVE360-VSI acts as the co-simulation orchestrator and is responsible for synchronization, interconnection, and data exchange through a server. The server establishes connections among the different clients and also ensures adherence to the Ethernet protocol. We conclude with illustrative digital twin simulations and recommendations for future work.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
CB-HVTNet: A channel-boosted hybrid vision transformer network for lymphocyte assessment in histopathological images
Authors:
Momina Liaqat Ali,
Zunaira Rauf,
Asifullah Khan,
Anabia Sohail,
Rafi Ullah,
Jeonghwan Gwak
Abstract:
Transformers, due to their ability to learn long range dependencies, have overcome the shortcomings of convolutional neural networks (CNNs) for global perspective learning. Therefore, they have gained the focus of researchers for several vision related tasks including medical diagnosis. However, their multi-head attention module only captures global level feature representations, which is insuffic…
▽ More
Transformers, due to their ability to learn long range dependencies, have overcome the shortcomings of convolutional neural networks (CNNs) for global perspective learning. Therefore, they have gained the focus of researchers for several vision related tasks including medical diagnosis. However, their multi-head attention module only captures global level feature representations, which is insufficient for medical images. To address this issue, we propose a Channel Boosted Hybrid Vision Transformer (CB HVT) that uses transfer learning to generate boosted channels and employs both transformers and CNNs to analyse lymphocytes in histopathological images. The proposed CB HVT comprises five modules, including a channel generation module, channel exploitation module, channel merging module, region-aware module, and a detection and segmentation head, which work together to effectively identify lymphocytes. The channel generation module uses the idea of channel boosting through transfer learning to extract diverse channels from different auxiliary learners. In the CB HVT, these boosted channels are first concatenated and ranked using an attention mechanism in the channel exploitation module. A fusion block is then utilized in the channel merging module for a gradual and systematic merging of the diverse boosted channels to improve the network's learning representations. The CB HVT also employs a proposal network in its region aware module and a head to effectively identify objects, even in overlap** regions and with artifacts. We evaluated the proposed CB HVT on two publicly available datasets for lymphocyte assessment in histopathological images. The results show that CB HVT outperformed other state of the art detection models, and has good generalization ability, demonstrating its value as a tool for pathologists.
△ Less
Submitted 19 July, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Unsupervised Recycled FPGA Detection Using Symmetry Analysis
Authors:
Tanvir Ahmad Tarique,
Foisal Ahmed,
Maksim Jenihhin,
Liakot Ali
Abstract:
Recently, recycled field-programmable gate arrays (FPGAs) pose a significant hardware security problem due to the proliferation of the semiconductor supply chain. Ring oscillator (RO) based frequency analyzing technique is one of the popular methods, where most studies used the known fresh FPGAs (KFFs) in machine learning-based detection, which is not a realistic approach. In this paper, we presen…
▽ More
Recently, recycled field-programmable gate arrays (FPGAs) pose a significant hardware security problem due to the proliferation of the semiconductor supply chain. Ring oscillator (RO) based frequency analyzing technique is one of the popular methods, where most studies used the known fresh FPGAs (KFFs) in machine learning-based detection, which is not a realistic approach. In this paper, we present a novel recycled FPGA detection method by examining the symmetry information of the RO frequency using unsupervised anomaly detection method. Due to the symmetrical array structure of the FPGA, some adjacent logic blocks on an FPGA have comparable RO frequencies, hence our method simply analyzes the RO frequencies of those blocks to determine how similar they are. The proposed approach efficiently categorizes recycled FPGAs by utilizing direct density ratio estimation through outliers detection. Experiments using Xilinx Artix-7 FPGAs demonstrate that the proposed method accurately classifies recycled FPGAs from 10 fresh FPGAs by x fewer computations compared with the conventional method.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
Harmony Search: Current Studies and Uses on Healthcare Systems
Authors:
Maryam T. Abdulkhaleq,
Tarik A. Rashid,
Abeer Alsadoon,
Bryar A. Hassan,
Mokhtar Mohammadi,
Jaza M. Abdullah,
Amit Chhabra,
Sazan L. Ali,
Rawshan N. Othman,
Hadil A. Hasan,
Sara Azad,
Naz A. Mahmood,
Sivan S. Abdalrahman,
Hezha O. Rasul,
Nebojsa Bacanin,
S. Vimal
Abstract:
One of the popular metaheuristic search algorithms is Harmony Search (HS). It has been verified that HS can find solutions to optimization problems due to its balanced exploratory and convergence behavior and its simple and flexible structure. This capability makes the algorithm preferable to be applied in several real-world applications in various fields, including healthcare systems, different e…
▽ More
One of the popular metaheuristic search algorithms is Harmony Search (HS). It has been verified that HS can find solutions to optimization problems due to its balanced exploratory and convergence behavior and its simple and flexible structure. This capability makes the algorithm preferable to be applied in several real-world applications in various fields, including healthcare systems, different engineering fields, and computer science. The popularity of HS urges us to provide a comprehensive survey of the literature on HS and its variants on health systems, analyze its strengths and weaknesses, and suggest future research directions. In this review paper, the current studies and uses of harmony search are studied in four main domains. (i) The variants of HS, including its modifications and hybridization. (ii) Summary of the previous review works. (iii) Applications of HS in healthcare systems. (iv) And finally, an operational framework is proposed for the applications of HS in healthcare systems. The main contribution of this review is intended to provide a thorough examination of HS in healthcare systems while also serving as a valuable resource for prospective scholars who want to investigate or implement this method.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
Explainable Medical Image Segmentation via Generative Adversarial Networks and Layer-wise Relevance Propagation
Authors:
Awadelrahman M. A. Ahmed,
Leen A. M. Ali
Abstract:
This paper contributes to automating medical image segmentation by proposing generative adversarial network-based models to segment both polyps and instruments in endoscopy images. A major contribution of this work is to provide explanations for the predictions using a layer-wise relevance propagation approach designating which input image pixels are relevant to the predictions and to what extent.…
▽ More
This paper contributes to automating medical image segmentation by proposing generative adversarial network-based models to segment both polyps and instruments in endoscopy images. A major contribution of this work is to provide explanations for the predictions using a layer-wise relevance propagation approach designating which input image pixels are relevant to the predictions and to what extent. On the polyp segmentation task, the models achieved 0.84 of accuracy and 0.46 on Jaccard index. On the instrument segmentation task, the models achieved 0.96 of accuracy and 0.70 on Jaccard index. The code is available at https://github.com/Awadelrahman/MedAI.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
High Speed Data Transmission over GI-MMF Using Mode Group Division Multiplexing
Authors:
Bernd Franz,
Liaquat Ali,
Laurent Schmalen,
Wilfried Idler
Abstract:
We transmitted 4x28 Gbit/s over 5-km standard GI-MMF using four different mode groups in combination with direct detection and on-off-keying format (OOK). Due to the square-law detection in the receiver MIMO processing is not effective. Therefore proper mode group selective multiplexing and de-multiplexing is essential.
We transmitted 4x28 Gbit/s over 5-km standard GI-MMF using four different mode groups in combination with direct detection and on-off-keying format (OOK). Due to the square-law detection in the receiver MIMO processing is not effective. Therefore proper mode group selective multiplexing and de-multiplexing is essential.
△ Less
Submitted 9 January, 2015;
originally announced January 2015.
-
Evaluating Wireless Reactive Routing Protocols with Linear Programming Model for Wireless Ad-hoc Networks
Authors:
N. Javaid,
M. Ilahi,
R. D. Khan,
L. Ali,
U. Qasim,
Z. A. Khan
Abstract:
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users dem…
▽ More
In Wireless Ad-hoc Networks, nodes are free to move randomly and organize themselves arbitrarily, thus topology may change quickly and capriciously. In Mobile Ad-hoc NETworks, specially Wireless Multi-hop Networks provide users with facility of quick communication. In Wireless Multi-hop Networks, routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models to assess and enhance reactive routing protocols. To practically examine constraints of respective Linear Programming models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of Linear Programming models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of Wireless Multi-hop Networks, we conduct simulations using NS-2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Evaluating Wireless Proactive Routing Protocols under Mobility and Scalability Constraints
Authors:
N. Javaid,
R. D. Khan,
M. Ilahi,
L. Ali,
Z. A. Khan,
U. Qasim
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine the constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 4 June, 2013;
originally announced June 2013.
-
Algorithm and Implementation of the Blog-Post Supervision Process
Authors:
Kamanashis Biswas,
Md. Liakat Ali,
S. A. M. Harun
Abstract:
A web log or blog in short is a trendy way to share personal entries with others through website. A typical blog may consist of texts, images, audios and videos etc. Most of the blogs work as personal online diaries, while others may focus on specific interest such as photographs (photoblog), art (artblog), travel (tourblog), IT (techblog) etc. Another type of blogging called microblogging is also…
▽ More
A web log or blog in short is a trendy way to share personal entries with others through website. A typical blog may consist of texts, images, audios and videos etc. Most of the blogs work as personal online diaries, while others may focus on specific interest such as photographs (photoblog), art (artblog), travel (tourblog), IT (techblog) etc. Another type of blogging called microblogging is also very well known now-a-days which contains very short posts. Like the developed countries, the users of blogs are gradually increasing in the develo** countries e.g. Bangladesh. Due to the nature of open access to all users, some people misuse it to spread fake news to achieve individual or political goals. Some of them also post vulgar materials that make an embarrass situation for other bloggers. Even, sometimes it indulges the reputation of the victim. The only way to overcome this problem is to bring all the posts under supervision of the blog moderator. But it totally contradicts with blogging concepts. In this paper, we have implemented an algorithm that would help to prevent the offensive entries from being posted. These entries would go through a supervision process to justify themselves as legal posts. From the analysis of the result, we have shown that this approach can eliminate the chaotic situations in blogosphere at a great extent. Our experiment shows that about 90% of offensive posts can be detected and stopped from being published using this approach.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.